1961 lines
92 KiB
Plaintext
1961 lines
92 KiB
Plaintext
F I D O N E W S -- Volume 14, Number 9 3 March 1997
|
||
+----------------------------+-----------------------------------------+
|
||
| The newsletter of the | ISSN 1198-4589 Published by: |
|
||
| FidoNet community | "FidoNews" |
|
||
| _ | 1-904-409-7040 [1:1/23] |
|
||
| / \ | |
|
||
| /|oo \ | |
|
||
| (_| /_) | |
|
||
| _`@/_ \ _ | |
|
||
| | | \ \\ | Editor: |
|
||
| | (*) | \ )) | Christopher Baker 1:18/14 |
|
||
| |__U__| / \// | |
|
||
| _//|| _\ / | |
|
||
| (_/(_|(____/ | |
|
||
| (jm) | Newspapers should have no friends. |
|
||
| | -- JOSEPH PULITZER |
|
||
+----------------------------+-----------------------------------------+
|
||
| Submission address: FidoNews Editor 1:1/23 |
|
||
+----------------------------------------------------------------------+
|
||
| MORE addresses: |
|
||
| |
|
||
| submissions=> cbaker84@digital.net |
|
||
+----------------------------------------------------------------------+
|
||
| For information, copyrights, article submissions, |
|
||
| obtaining copies of FidoNews or the internet gateway FAQ |
|
||
| please refer to the end of this file. |
|
||
+----------------------------------------------------------------------+
|
||
|
||
|
||
WANT YOUR MESSAGE IN THIS SPACE? SEND IT IN!
|
||
|
||
|
||
Table of Contents
|
||
1. EDITORIAL ................................................ 1
|
||
No responses to last week's Questions .................... 1
|
||
2. ARTICLES ................................................. 2
|
||
Net 1:231 Has a New Web Page ............................. 2
|
||
'Anarchy' in Region 50 Russia - no RC? ................... 2
|
||
An Innocent Bystander .................................... 3
|
||
3. GETTING TECHNICAL ........................................ 6
|
||
FSC-0044 - Improved method of duplicate message detecti .. 6
|
||
4. COORDINATORS CORNER ...................................... 20
|
||
Nodelist-statistics as seen from Zone-2 for day 059 ...... 20
|
||
5. WE GET EMAIL ............................................. 21
|
||
Another Internet-FidoNet query ........................... 21
|
||
6. NET HUMOR ................................................ 24
|
||
Computer riddles? ........................................ 24
|
||
7. NOTICES .................................................. 25
|
||
Future History ........................................... 25
|
||
8. FIDONET SOFTWARE LISTING ................................. 26
|
||
Latest Greatest Software Versions ........................ 26
|
||
9. FIDONEWS PUBLIC-KEY ...................................... 32
|
||
FidoNews PGP public-key listing .......................... 32
|
||
10. FIDONET BY INTERNET ..................................... 33
|
||
11. FIDONEWS INFORMATION .................................... 35
|
||
FIDONEWS 14-09 Page 1 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
EDITORIAL
|
||
=================================================================
|
||
|
||
|
||
Quando Omni Flunkus Moritati strikes again. [See FidoNews 1351.]
|
||
|
||
Seems to be a little uproar in Russia.
|
||
|
||
USR is finally releasing the X2 firmware download for those who
|
||
have V34s and haven't heard.
|
||
|
||
The FSC in this week's Issue was written by Jack Decker who left
|
||
FidoNet about three years ago but still reads the FidoNews and
|
||
wanted to say 'hi' to those who remember him. His contact info
|
||
appears at the end of his FSC today.
|
||
|
||
We have a couple new FidoNet sites in the Internet section.
|
||
|
||
There are no Headlines or film at eleven this week.
|
||
|
||
C.B.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 2 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
|
||
Net 1:231 Has a New Web Page
|
||
by Richard Bash - 1:231/0
|
||
Internet: rmbash@cord.iupui.edu
|
||
|
||
FidoNet 1:231 in Indianapolis, Indiana, is pleased to announce
|
||
the creation of a web page for the Net. The URL is:
|
||
|
||
http://www.oaktree.net/net231
|
||
|
||
While no astounding creation of art, the page lists all of the
|
||
members of Net 231, their BBS names, BBS phone numbers and also
|
||
provides links to web pages of the members of the Net. Documents
|
||
such as POLICY4.DOC, the local Net operating guidelines and a node
|
||
application form are also available via the web page. You are
|
||
invited to visit the site and provide your constructive comments on
|
||
ways to improve the page.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
Elections of R50C went crazy
|
||
|
||
By Mikhail Ramendik, 2:5020/145.43, ramen@average.org
|
||
|
||
WARNING: this question caused much flame in the Russian sysop areas.
|
||
I am not into it either side, in fact I'm not a Node at all. I just
|
||
want to communicate an interesting story.
|
||
|
||
It all started as usual. R50C, Basil Dolmatov 2:5020/140, has quietly
|
||
resigned. Elections were announced, Kostya Boyko 2:5020/37 became
|
||
Returning Officer.
|
||
|
||
The elections were to end somewhere like February 17. But some mail
|
||
was lost on the way to the RO. So the senders (an entire Net)
|
||
requested a prolongation. The RO granted it to 22 Feb. Then...
|
||
|
||
On 19 Feb he announced the results. Dmitry Zavalishin, 2:5020/32, won.
|
||
|
||
He claimed that as the mail from the requestors has arrived, the vote
|
||
was over, despite the public announcement of prolongation. Flame
|
||
started here.
|
||
|
||
But it did not end here. For the winner got only 44% of the votes
|
||
that came, with Mikel Lavrentyev 2:5020/35 second with 23%. A second
|
||
run - between these two was requested from the RO and finally granted
|
||
by him. But...
|
||
|
||
BY THIS TIME, THE OLD RC AND THE ZC HAVE RECOGNIZED THE NEW RC!!!
|
||
|
||
So now we have no publicly accepted RC. Anarchy? ;)
|
||
|
||
FIDONEWS 14-09 Page 3 3 Mar 1997
|
||
|
||
|
||
This situation is very dynamic. In fact it may change by the time
|
||
this article reaches Fidonews. And I hold NO opinion on what side is
|
||
right. But it calls us to some thoughts.
|
||
|
||
What has become of the Net which started as just a union of friendly
|
||
SysOps?
|
||
|
||
Why has the Founding Father Tom Jennings left his creation? I have
|
||
his answer here in a letter of July 1994. The text of the letter
|
||
makes it clear that this information is not confidential.
|
||
|
||
8<
|
||
|
||
Personally, I consider "policy4" to be a smelly old crock of shit.
|
||
You can quote me on that, only you will find many people have heard
|
||
me say it before... :-)
|
||
|
||
Note that "POLICY4" contains valid procedural advice and information
|
||
-- how to assign numbers, how to define a functional system, and
|
||
such. For that it's fine. Otherwise, the actual policy is intended to
|
||
let a small number of people control the behavior and speech of
|
||
another, larger group of people. I immediately mistrust people who
|
||
propose such things. If they are young enough, I give them time to
|
||
get over it :-)
|
||
|
||
8<
|
||
|
||
Do we NEED to have this structure, so that the RC elections become
|
||
something like Presidential ones with all the necessary scandals?
|
||
Surely the *backbone* needs management, but then the Net and the
|
||
backbone are not the same, and one theoretically can be a node and
|
||
not link to a backbone.
|
||
|
||
I'm NOT proposing anything here. It's just food for thought. And - I
|
||
apologize to Tom Jennings if it was not good to quote his letter.
|
||
|
||
In fact, my secret desire is that he would show up here with an
|
||
article explaining his thoughts. Perhaps we have grown old enough to
|
||
understand.
|
||
|
||
Mikhail Ramendik. Moscow, Russia. Team OS/2.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|
||
An Innocent Bystander
|
||
Robert "Not a Sysop" Parson
|
||
Jackalope Junction 1:3822/1
|
||
|
||
|
||
I've been reading Fidonews with great interest over the past several
|
||
months (actually years, but that's another matter). Quite a few
|
||
things have sparked my interest, and I thought I'd comment as an
|
||
"interested bystander." (It's true, I'm really not a sysop.)
|
||
|
||
I noticed a disturbing trend in the Coordinator's Corner that Zone 1
|
||
FIDONEWS 14-09 Page 4 3 Mar 1997
|
||
|
||
|
||
was losing roughly 200 nodes a week, so I started keeping my own stats
|
||
on the Nodelist. There are some differences, which I attribute mainly
|
||
to the differences in which we are compiling our stats, but generally
|
||
turned up the same thing. At this rate, Zone 1 will cease to exist in
|
||
midsummer 1998. By the way, according to the latest report published
|
||
in Fidonews, the number of nodes in North America has now slipped
|
||
below 10,000. My hat's off to Ward Dossche for compiling and making
|
||
this analysis available.
|
||
|
||
On this subject, someone noted a couple months ago that most of the
|
||
nodes in Zone 2 are not BBSs. His description sounded like most of
|
||
them were glorified points. If someone could explain this a bit
|
||
better or clear up any misunderstanding on my part, I'd appreciate it.
|
||
|
||
Someone else noted (I really should keep Fidonews archived on my
|
||
computer and give these people the appropriate credit. But again, I'm
|
||
not a Sysop) that a "State of the Network" message/address/whatever
|
||
would be of interest. There are significant problems with Fidonet
|
||
both technically and internally. He's in charge, at least nominally,
|
||
and we should demand he say something.
|
||
|
||
Election underway for IC and pending for Z1C? Without notice in
|
||
Fidonews? After consulting Policy 4, it appears notice of elections
|
||
is not necessary. Looks like something that needs to be fixed.
|
||
|
||
And about that Policy 4... forget it. P4 doesn't work. It's
|
||
outdated and the only reason it's pulled out is when somebody has some
|
||
griping to do. Should The Powers That Are ever decide to update
|
||
Fidonet Policy, don't bother with P4.whatever. Scrap the darn thing
|
||
entirely, start fresh, skip a P5 even and go on to P6. My first
|
||
recommendation is to split it into two documents. One that is
|
||
specific to technical standards, the other for personnel matters
|
||
(moderators, coordinators, and the ubiquitous etc). I also think a
|
||
Fidonet Users' Guide for non-sysops would be very helpful.
|
||
|
||
Since the latest Big Controversy seems to be Chris Baker's editorship
|
||
of Fidonews, I thought I'd comment on that as well.
|
||
|
||
I contacted Donald Tees about taking over the reigns about two years
|
||
ago when he originally announced he was considering resigning. My
|
||
vision was somewhat different from his and the (unwritten) mission of
|
||
Fidonews. So, I opted out. Nobody else picked up the standard. Late
|
||
last year, Donald disappeared from Fidonet. After several weeks
|
||
hiatus, and apparently quite a bit of non-action on the part of those
|
||
who had responsibility, Chris began publishing Fidonews. There are
|
||
some things I would not have done, and a few things I wish I'd thought
|
||
of. But generally, I think he's doing a good job with this thankless
|
||
position.
|
||
|
||
If there's somebody upset enough with Chris' editorship, there's
|
||
nothing to stop them from publishing a competing Fidonews, as long as
|
||
it doesn't actually call itself "Fidonews" or represent itself as the
|
||
"Official Publication of Fidonet." I think anyone who tries will find
|
||
out exactly how difficult it is.
|
||
|
||
Now that I've rattled on a bit, I guess I should tell you what I bring
|
||
FIDONEWS 14-09 Page 5 3 Mar 1997
|
||
|
||
|
||
to the table since I've noted I'm not a sysop: nothing. I'm just a
|
||
user of a local BBS. And isn't bringing us users together what
|
||
Fidonet is all about? I'm keenly interested in the continued
|
||
viability of Fidonet. And frankly, it looks pretty shaky.
|
||
|
||
|
||
Robert Parson 1:3822/1
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 6 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
GETTING TECHNICAL
|
||
=================================================================
|
||
|
||
|
||
[This is part of a continuing series of FTSC Standards and Proposals
|
||
and the FidoNet History series. These docs have been reformatted to 70
|
||
columns where necessary. Node numbers that appear in these docs are
|
||
often no longer in service. Check your Nodelist for current listings
|
||
of authors.] Ed.
|
||
|
||
|
||
Document: FSC-0044
|
||
Version: 002
|
||
Date: 07-Oct-1990
|
||
|
||
An improved method of duplicate message detection and prevention
|
||
|
||
Jack Decker
|
||
1:154/8@Fidonet
|
||
|
||
Status of this document:
|
||
|
||
This FSC suggests a proposed protocol for the FidoNet(r)
|
||
community, and requests discussion and suggestions for
|
||
improvements. Distribution of this document is subject to the
|
||
restrictions stated in the copyright paragraph below.
|
||
|
||
Fido and FidoNet are registered marks of Tom Jennings and Fido
|
||
Software.
|
||
|
||
Purpose:
|
||
|
||
The purpose of this document is to present a proposal for an improved
|
||
method of duplicate message detection and prevention, that could
|
||
eventually replace the existing PATH and SEEN-BY lines currently used
|
||
within Fidonet. The principal advantages of this method over previous
|
||
schemes is that it is fully Domain-, Zone-, and Point-aware, and that
|
||
it adds far fewer bytes to a message than the current combination of
|
||
SEEN-BY and PATH lines. It can also be run in parallel with existing
|
||
SEEN-BY and PATH lines for an indefinite period, thus allowing a
|
||
"transition period" of as long as is necessary for software to be
|
||
converted.
|
||
|
||
Copyright:
|
||
|
||
This document is Copyright 1990 by Jack Decker. However, permission
|
||
is granted for any and all non-commercial use, providing the contents
|
||
of this document are not altered in any way. Also, permission is
|
||
expressly granted for any use by developers of software primarily
|
||
intended to be used in the Fidonet amateur communications network, or
|
||
in any similar amateur communications network that primarily uses
|
||
Fidonet technology and protocols, whether that software is commercial
|
||
or not.
|
||
|
||
Comments on this proposal, and suggestions for improvement are
|
||
FIDONEWS 14-09 Page 7 3 Mar 1997
|
||
|
||
|
||
welcomed by the author. In particular, suggestions on how this
|
||
proposal might be reworded to make the meaning clearer are especially
|
||
welcome.
|
||
|
||
A. Definition:
|
||
|
||
In this document the characters ^A (caret and capital A) will be used
|
||
to represent a 0x01 (SOH) byte. It will be most commonly used in
|
||
reference to the "^APTH line", which will be a line that begins with a
|
||
0x01 byte immediately followed by the letters "PTH" (and then by
|
||
additional data as specified below).
|
||
|
||
B. Why a new method of duplicate message detection is needed:
|
||
|
||
Most of the methods of duplicate message detection currently used in
|
||
Fidonet echomail processing operate by trying to find some
|
||
distinguishing characteristic of an echomail message (whether it be
|
||
something deliberately included in the message, such as an EID, MSGID,
|
||
etc. type of "kludge line", or something which is contained in all
|
||
echomail messages, such as the message header). Typically, either the
|
||
item being used for duplicate detection itself or a checksum of that
|
||
item is then saved in a data file, and if another item comes in with
|
||
that same distinguishing characteristic, the message is considered to
|
||
be a duplicate message. The data files used to store previously-seen
|
||
message data can occupy a significant amount of disk space if many
|
||
conferences are carried on a system.
|
||
|
||
Unfortunately, all such schemes seem to suffer from the drawback that
|
||
under the proper circumstances, messages that are not duplicates of
|
||
each other may be created with identifying characteristics that are
|
||
similar enough to be falsely recognized as duplicates. The
|
||
circumstances under which this can happen may differ from method to
|
||
method, but none are totally foolproof. Thus, it's possible that
|
||
messages may be deleted as duplicates even though in reality they are
|
||
not duplicates, but rather they are simply messages that contain data
|
||
that make them appear to be duplicates.
|
||
|
||
The most common cause of duplicate messages is improper echomail
|
||
topology (also known as the infamous "dupe loop"). While there are
|
||
certainly other ways that duplicates can be generated, improper
|
||
topology is far and away the leading cause. Further, many of the
|
||
current duplicate elimination schemes will NOT catch most of the
|
||
duplicates that are NOT generated as a result of improper topology
|
||
(which is why duplicate messages are seen occasionally, even though
|
||
duplicate message detection schemes are currently in use).
|
||
|
||
Unfortunately, if a duplicate killer is to be effective, it must store
|
||
the identifying characteristics for the last several thousand messages
|
||
that have passed through a particular system. This not only uses up
|
||
disk storage space, it consumes extra processing time during echomail
|
||
processing, since each new arriving message must be compared to the
|
||
data list in the attempt to determine if it is, indeed, a duplicate.
|
||
|
||
A better approach would be to store within a message itself data that
|
||
identifies it as having already been received by a particular system,
|
||
before sending it on to another system. Then, if the same message
|
||
FIDONEWS 14-09 Page 8 3 Mar 1997
|
||
|
||
|
||
came back to a given system in a "dupe loop", it would be possible to
|
||
positively identify it as one that has already been seen on that
|
||
particular system. And, since the data necessary to identify the
|
||
message as a duplicate is stored within the message itself, it is
|
||
possible to use this method without the necessity of storing great
|
||
amounts of data on previously-seen messages (in many implementations
|
||
this alone would save 10K or more of disk space per conference
|
||
carried!).
|
||
|
||
Were it not for the fact that the PATH line present in most echomail
|
||
messages does not contain Zone or Point information, we could use it
|
||
for that purpose. However, since it does not contain that
|
||
information, it cannot and should not be used in that manner. Another
|
||
drawback of the PATH line is that because it is physically located at
|
||
the end of a message (after the SEEN-BY lines), if only the last part
|
||
of a message is scrambled or deleted, the PATH line information will
|
||
be lost.
|
||
|
||
C. Proposal:
|
||
|
||
1) A new type of kludge line (commonly known within FIDONET as an
|
||
"IFNA kludge line"), which combines certain characteristics of the
|
||
existing PATH and SEEN-BY lines, will be placed into each echomail
|
||
message. This line, known as the ^APTH line, will be placed at the
|
||
TOP of the message (not necessarily the first line, but prior to the
|
||
body of the message text). IMPORTANT: Support for the existing PATH
|
||
and SEEN-BY lines will be retained as long as is necessary to
|
||
accommodate everyone in Fidonet, but eventually the ^APTH line could
|
||
possibly replace both the current PATH and SEEN-BY lines.
|
||
|
||
2) The ^APTH line will contain full five-dimensional addressing
|
||
(Zone:Net/Node.Point@Domain), BUT elements that are the same as the
|
||
previous entry in the line need not be repeated (except when a message
|
||
passes to a new domain, in which case the full address of the first
|
||
node in the new domain shall be given). When the "point" portion of
|
||
an address stands alone, it shall be preceded by at least a "."
|
||
character (to distinguish it from a node address).
|
||
|
||
3) If a system is importing messages and finds a message with its own
|
||
address already in the ^APTH line, it will discard the message (unless
|
||
that address is in the very last position on the line... this allows
|
||
for the odd situation where a point or another task on the same system
|
||
has already inserted the system's address in the ^APTH line, or where
|
||
it is desirable to process the same message a second time).
|
||
|
||
4) One (and only one) modifier character may appear just AFTER any
|
||
address on the ^APTH line. When using the ^APTH for duplicate message
|
||
checking only, you may just skip past any such address, unless it's
|
||
your own address (see examples later in this document). In that case,
|
||
strip the address and the modifier character (in other words, if you
|
||
see your own address but it's immediately followed by a modifier
|
||
character, remove that address, add yours to the end of the ^APTH
|
||
line, and toss the message anyway). The reason for doing this is to
|
||
allow the design of an echomail processor that doesn't rely on SEEN-
|
||
BY's. Such a processor could append a modifier character (such as a
|
||
"!") to an address, in order to indicate that "this message hasn't
|
||
FIDONEWS 14-09 Page 9 3 Mar 1997
|
||
|
||
|
||
really passed through this node, but don't send it back there" (which
|
||
would be the equivalent of a SEEN-BY statement for that node,
|
||
indicating that this message has already been sent to that node).
|
||
Thus the ^APTH line could eventually take the place of SEEN-BY lines,
|
||
but you could still have a "fully coupled" triangular or rectangular
|
||
topology. In this case, you'd add the nodes that are part of that
|
||
fully coupled topology to the ^APTH line BEFORE sending the message to
|
||
them, but with the special character after the address. The receiver
|
||
would know that the message didn't really pass through that node yet,
|
||
but it should NOT send it to that node under any circumstances.
|
||
|
||
(Please note that during the initial design of software to create
|
||
^APTH lines, you would not have to worry about generating the special
|
||
case with the trailing modifier characters, you'd just have to be able
|
||
to handle them as shown in the examples below if you came across one).
|
||
|
||
D. Specifications and examples:
|
||
|
||
The general specifications for a ^APTH line, and a general outline of
|
||
how an incoming message might be processed follows.
|
||
|
||
A valid ^APTH line will contain at a minimum the string ^APTH followed
|
||
by a single space character and the network address of the system that
|
||
created the ^APTH line, in Zone:Net/Node[.Point]@Domain format, where
|
||
^A is a 0x01 byte (SOH) and the point address is required only if the
|
||
system is a point (specifically, a system that is NOT a point should
|
||
not use .0).
|
||
|
||
Once again, the FIRST Fidonet-technology address specified in a ^APTH
|
||
line is expected to contain, at a minimum, Zone, Net, and Node
|
||
numbers, and a valid Domain string preceded by the "@" character. If
|
||
any of these are missing from the FIRST address, the line should be
|
||
considered defective (exception: See Note 5, "Messages sent to/from
|
||
non-Fidonet-technology networks"). It will be left to the discretion
|
||
of the software author as to how to handle a message with a defective
|
||
^APTH line.
|
||
|
||
Subsequent addresses in the ^APTH line are delimited by spaces and
|
||
should contain only that information that is different from the
|
||
previous entry on the line, except when a message passes into a new
|
||
domain (in which case the full address of the first system in the new
|
||
domain shall be given) or when a bossnode receives a message from a
|
||
point, in which case the bossnode should append its node number only.
|
||
Specific examples follow:
|
||
|
||
a. If the Domain and Zone are the same as the previous address,
|
||
but the net is different, then only Net/Node[.Point] should be
|
||
used.
|
||
|
||
b. If the Domain, Zone and Net are the same as the previous
|
||
address, but the node is different, then only Node[.Point]
|
||
should be used.
|
||
|
||
c. If the Domain, Zone, Net, and Node are the same as the
|
||
previous address, but the point is different, then only .Point
|
||
should be used. Note that in this case, the period is
|
||
FIDONEWS 14-09 Page 10 3 Mar 1997
|
||
|
||
|
||
included.
|
||
|
||
d. If the Domain, Zone, Net, and Node are the same as the
|
||
previous address, but the previous address contains a point
|
||
specifier and the receiving system is not a point (i.e., it IS
|
||
the bossnode), then only Node should be used. .0 (point zero)
|
||
might also be a valid entry in this case, but only if the
|
||
bossnode consistently identifies itself to other systems using
|
||
a full five-dimensional address. For example, a message that
|
||
originated on 1:234/5.6@Fidonet and went from there to 1:234/5
|
||
would contain a ^APTH line in this format:
|
||
^APTH 1:234/5.6@Fidonet 5
|
||
If the bossnode is also considered to be point zero, then
|
||
^APTH 1:234/5.6@Fidonet .0
|
||
Would be equally valid.
|
||
|
||
In the case of a "fully connected" topology, nodes may be added to the
|
||
^APTH line even though a message has not actually passed through those
|
||
nodes, to prevent the message from being sent to those nodes. Such
|
||
nodes should have an exclamation point character ("!") appended to the
|
||
end of the entry, immediately following the node or point number.
|
||
These nodes should be added to the very end of a new or existing ^APTH
|
||
line, after the address of the node which added them.
|
||
|
||
For example, suppose that 157/200, 154/9, and 228/6 were in a "fully
|
||
connected" topology. When a message was received by 157/200 and then
|
||
sent to 154/9 and 228/6, the ^APTH line might look something like
|
||
this:
|
||
|
||
^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 157/200 154/9!
|
||
228/6!
|
||
|
||
When a message arrives on one of the nodes indicated by the
|
||
exclamation point, the exclamation point entry should be removed, and
|
||
the node should add itself to the end of the line in the normal
|
||
manner. For example, after the message containing the above ^APTH
|
||
line were received at 154/9, it would be modified to read:
|
||
|
||
^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 157/200 228/6!
|
||
154/9
|
||
|
||
Please note that at the time of this proposal, the exclamation point
|
||
(!) is the ONLY "officially recognized" modifier character that can be
|
||
expected to be appended to a ^APTH line address (except for the
|
||
@Domain string, of course), however, the possibility remains that
|
||
someone may figure out a good reason to use a different trailing
|
||
character for some other (but similar) purpose, so I am allowing for
|
||
that possibility by using the generic terminology "modifier character"
|
||
rather than the more specific "exclamation point" throughout this
|
||
document.
|
||
|
||
The ^APTH line must be terminated with a carriage return and/or
|
||
linefeed (a carriage return followed by a linefeed is preferred, and
|
||
should be used by all systems capable of generating a carriage
|
||
return/linefeed combination).
|
||
|
||
FIDONEWS 14-09 Page 11 3 Mar 1997
|
||
|
||
|
||
There is no specified limit on the length of a ^APTH line. Each
|
||
message should contain only one ^APTH line, even if it extends beyond
|
||
the typical 80 column screen width. The ^APTH line is primarily
|
||
intended for use by the conference mail processing software, so
|
||
primary consideration is being given to ease of processing the line,
|
||
rather than making it easily human-readable (most software will not
|
||
display kludge lines hidden behind a ^A character in any event).
|
||
|
||
E. Pseudo-outline of message processing
|
||
|
||
Here is a suggested flow pseudo-outline showing one way that messages
|
||
might be processed in a standalone program that runs between the
|
||
import and export cycles of an existing conference mail processor such
|
||
as ConfMail (this outline assumes that the standard Fido/Opus style
|
||
*.msg files are used, though obviously that need not be the case):
|
||
|
||
1. Open *.msg file for input
|
||
|
||
2. Open temporary file for output
|
||
|
||
3. Copy header (first 190 bytes) from input to output file. The
|
||
following operations begin immediately following this header.
|
||
|
||
4. Examine each line of input file (a line is delimited by a carriage
|
||
return, linefeed, or any combination thereof) for one of the
|
||
following:
|
||
|
||
a. A blank line - Write to output and examine next line.
|
||
|
||
b. A line containing spaces only - Write to output and examine
|
||
next line.
|
||
|
||
c. A line that begins with a 01 byte (SOH) - GoTo 5.
|
||
|
||
d. A line that does not meet any of the above specifications.
|
||
|
||
I. Create a line containing the string ^APTH followed by a
|
||
single space character and your network address, in
|
||
Zone:Net/Node[.Point]@Domain format, where ^A is a 0x01
|
||
byte (SOH) and the point address is required only if you
|
||
are a point (specifically, a system that is NOT a point
|
||
should not necessarily use .0). This line should be
|
||
terminated with a carriage return and/or linefeed (a
|
||
carriage return followed by a linefeed is preferred).
|
||
|
||
II. Write the line created in 4.d.I. to the output file.
|
||
|
||
III. Write the line input in 4. to the output file.
|
||
|
||
IV. Goto 9.
|
||
|
||
5. If a line begins with a 0x01 (SOH) byte, examine the keyword
|
||
immediately following it.
|
||
|
||
a. If the keyword is NOT "PTH", write the entire line to output
|
||
and examine the next line (go back to 4).
|
||
FIDONEWS 14-09 Page 12 3 Mar 1997
|
||
|
||
|
||
6. If a line begins with ^APTH, examine each address in the line in
|
||
turn. Addresses start immediately following the characters "PTH "
|
||
(note the space).
|
||
|
||
a. The FIRST Fidonet-technology address (not counting any
|
||
pseudo-addresses consisting solely of "@Domain") is expected
|
||
to contain, at a minimum, Zone, Net, and Node numbers, and a
|
||
valid Domain string preceded by the "@" character. If any of
|
||
these are missing from the FIRST Fidonet-technology address,
|
||
the line should be considered defective (See Note 5, "Messages
|
||
sent to/from non-Fidonet-technology networks", for information
|
||
on "@Domain" entries). It will be left to the discretion of
|
||
the software author as to how to handle a message with a
|
||
defective ^APTH line.
|
||
|
||
b. As each address is found, any Zone, Net, and Node numbers and
|
||
Domain strings found should be stored in temporary variables,
|
||
to be used as defaults for subsequent addresses when only a
|
||
partial address is given. For example, the first address will
|
||
contain a Zone number. This should be stored in a temporary
|
||
variable and used as the default Zone for all subsequent
|
||
addresses, until and unless another Zone number is seen in the
|
||
line, at which time that Zone number should be stored in the
|
||
temporary variable and used as the default Zone.
|
||
|
||
c. If an address is found that consists entirely of the "@"
|
||
character (as the first character of the address) followed by
|
||
a domain name (with or without punctuation), all temporary
|
||
variables (defaults) should be cleared (since any subsequent
|
||
Fidonet-technology address should contain full
|
||
Zone:Net/Node[.Point]@Domain information). Otherwise, such
|
||
pseudo-addresses (consisting solely of @Domain) may be ignored
|
||
at systems that do not serve as inter-network gateways (such
|
||
entries are maintained only by inter-network "gateway"
|
||
software). However, they should not under any circumstances
|
||
be removed from the ^APTH line.
|
||
|
||
7. As each address is found, it should be compared against the
|
||
system's address. If a match is found:
|
||
|
||
a. Check to make sure that the address is not a point address if
|
||
the system's address does not contain a point specifier. If
|
||
the system's address is given without a point specifier, then
|
||
it should not be considered a match if ANY point address is
|
||
found in the ^APTH line address that is being compared (not
|
||
even .0 - for example, if the address 1:234/5.0 is seen in the
|
||
^APTH line, and 1:234/5 is the given system address, then it
|
||
is NOT a match).
|
||
|
||
b. If the address does match exactly, check to see if a modifier
|
||
character (specifically the "!" character) immediately follows
|
||
the address. If it does, then that address must be removed
|
||
from the line at that point.
|
||
|
||
I. When removing an address, please make sure that you do
|
||
not change the address of subsequent entries. This may
|
||
FIDONEWS 14-09 Page 13 3 Mar 1997
|
||
|
||
|
||
require modification of the next entry on the line, if
|
||
one exists. For example, suppose you had a "fully
|
||
connected" topology where 1:157/200 sent an echo to both
|
||
1:154/9 and 1:154/970. The ^APTH line might end
|
||
as follows:
|
||
..... 157/200 154/9! 970!
|
||
However, after modification of the ^APTH line, it should
|
||
read: ..... 157/200 154/970! 9
|
||
You can see that if 154/9 were simply deleted without
|
||
regard to what follows on the line, the following
|
||
(incorrect) line might result:
|
||
..... 157/200 970! 154/9 (THIS IS
|
||
INCORRECT)
|
||
The above is incorrect because 154/970 has been
|
||
transformed into 157/970.
|
||
|
||
II. After removing an address followed by a modifier
|
||
character, continue to scan any remaining addresses in
|
||
the ^APTH line in case a match is found later in the
|
||
line. If no other matches are found, proceed as if no
|
||
match had been found. Goto 8.
|
||
|
||
c. Check to see if the address is the last one on the line (not
|
||
counting addresses that have a modifier character immediately
|
||
following them). If this address is followed only by the end
|
||
of the line, or ONLY by addresses that have a modifier
|
||
trailing character, then there is a very high probability
|
||
that we have either inadvertently or deliberately processed
|
||
this message twice, and it is not really a duplicate. In
|
||
this case, the original *.msg file should be left untouched.
|
||
|
||
I. Close both the input and output files.
|
||
|
||
II. Delete the temporary output file. END.
|
||
|
||
d. If a match is found, and it is not followed by a modifier
|
||
character, and it is not the last address on the ^APTH line,
|
||
then the message is a duplicate message and should be treated
|
||
as such (either by deleting it, or moving it to a "bad
|
||
messages" area or the netmail area).
|
||
|
||
I. Close both the input and output files.
|
||
|
||
II. Delete the temporary output file.
|
||
|
||
III. Either delete or move the original .msg input file, as
|
||
appropriate. END.
|
||
|
||
8. If the end of the ^APTH line is reached and a match has not been
|
||
found, then add the system's address to the end of the ^APTH line.
|
||
Then write the modified ^APTH line to the output file.
|
||
|
||
I. If one or more addresses with an appended modifier
|
||
character (used within "fully-coupled" topologies) are
|
||
to be added to the ^APTH line, they should be added at
|
||
the very end of the line, after the address of the
|
||
FIDONEWS 14-09 Page 14 3 Mar 1997
|
||
|
||
|
||
system currently processing the message).
|
||
|
||
9. Copy the remainder of the input file to the output file. Close
|
||
both files.
|
||
|
||
10. Delete the input file.
|
||
|
||
11. Rename the temporary output filename to the old input filename.
|
||
END.
|
||
|
||
[End of outline]
|
||
|
||
F. Additional notes and clarifications:
|
||
|
||
Note 1: In section 7.b.I. I mentioned the necessity of not simply
|
||
deleting a node from the ^APTH line without checking to see if the
|
||
next address in the ^APTH line needs to be modified. This can easily
|
||
be accomplished if TWO sets of temporary variables are kept, for the
|
||
CURRENT and PREVIOUS Domain, Zone, Net, and Node information (Point
|
||
addresses are NOT kept as defaults, thus there is no need to store
|
||
Point information). When reading the FIRST address in the ^APTH line,
|
||
the Domain, Zone, Net, and Node information of that address would be
|
||
stored in both the CURRENT and PREVIOUS variables. Thereafter,
|
||
whenever a new Domain string or Zone, Net, or Node number is
|
||
explicitly specified in a ^APTH line address, the new value(s) are
|
||
stored in the CURRENT variables, but first the CURRENT values are
|
||
moved to the PREVIOUS values.
|
||
|
||
To help visualize this, let's again suppose we have a ^APTH line that
|
||
ends as follows (all of these addresses are in Fidonet Zone 1):
|
||
|
||
..... 157/200 154/9! 970!
|
||
|
||
Let's suppose that we are processing this message on 154/9, and will
|
||
need to remove the 154/9! address. When we encounter 157/200, our
|
||
variables will be set as follows:
|
||
|
||
Previous | Current
|
||
Domain Fidonet | Fidonet
|
||
Zone 1 | 1
|
||
Net ? | 157
|
||
Node ? | 200
|
||
|
||
Now, when we read 154/9, our current values will be moved to the
|
||
previous:
|
||
|
||
Previous | Current
|
||
Domain Fidonet | Fidonet
|
||
Zone 1 | 1
|
||
Net 157 | 154
|
||
Node 200 | 9
|
||
|
||
We now have the data we need to determine what needs to be added to
|
||
the next address, after we delete 154/9. In this case, we need only
|
||
compare the Previous and Current addresses to determine which are
|
||
UNEQUAL. In this case, the Zone and Domain are the same, but the Net
|
||
FIDONEWS 14-09 Page 15 3 Mar 1997
|
||
|
||
|
||
and Node are not. So, if the following address lacks either the Net
|
||
or Node, we'll have to add those. Now we delete the 154/9! and look
|
||
at the next address, 970. At this point our variables will look like
|
||
this:
|
||
|
||
Previous | Current
|
||
Domain Fidonet | Fidonet
|
||
Zone 1 | 1
|
||
Net 154 | 154
|
||
Node 9 | 970
|
||
|
||
Again, we compare to see which addresses are UNEQUAL. In this case,
|
||
only the NODE address is. So we know we do NOT have to add the NODE
|
||
address, nor do we have to add the Zone or Domain information (because
|
||
they were not different on the first compare). We only need add those
|
||
address components which were unequal on the first compare, but equal
|
||
on the second compare. So, in this case, the Net address must be
|
||
added to the next address in the ^APTH line, leaving as a result:
|
||
|
||
..... 157/200 154/970!
|
||
|
||
The current system address is then added back in at the end of the
|
||
line, thus:
|
||
|
||
..... 157/200 154/970! 9
|
||
|
||
Note that whenever a new Domain is specified, the full address (four-
|
||
or five-dimensional, depending on whether a point address is given)
|
||
must be used. In other words, an address that includes an "@Domain"
|
||
string but that does not also include the Zone, Net, and Node
|
||
components of the address is considered invalid (it does not meet
|
||
specifications).
|
||
|
||
Note 2: In section 4.d it is suggested that, when a line that is
|
||
neither blank nor a kludge line (that begins with a ^A character) is
|
||
found, a ^APTH line be added at that point. However, there are
|
||
reports that under certain circumstances (particularly when messages
|
||
are "forwarded" or "hurled"), certain software may insert a non-kludge
|
||
line prior to previously-existing kludge lines in a message. It
|
||
should be recognized by software authors that a non-kludge line should
|
||
NEVER be inserted in front of existing kludge lines located at the
|
||
start of a message, if those kludge lines are still valid (and if they
|
||
are NOT still valid, they should be removed. When a message is
|
||
forwarded or hurled, it is probably desirable to remove duplicate
|
||
control information since what is essentially happening is that the
|
||
text of a previous message is being inserted into a NEW message.
|
||
Since the message is new, the "old" duplicate control information is
|
||
no longer valid).
|
||
|
||
Software authors that are implementing the ^APTH line in their
|
||
software should never search beyond the first text line of a message
|
||
for the ^APTH line, because if one is found later in the text, it is
|
||
in all probability an old ^APTH line that was inadvertently copied
|
||
over from another message, and is not relevant to the current message.
|
||
|
||
Note 3: This is an optional suggestion, for use during the transition
|
||
FIDONEWS 14-09 Page 16 3 Mar 1997
|
||
|
||
|
||
period in which the ^APTH line has to coexist with more traditional
|
||
PATH and SEEN-BY lines. If ^APTH line checking is being used during
|
||
the import phase of echomail processing in a conference mail
|
||
processor, it might be a good idea to optionally check to make sure
|
||
that all ^APTH line addresses that are in the system's home Zone and
|
||
Domain (including those with an appended modifier character) have been
|
||
properly included in the SEEN-BY lines, and to add any that have not
|
||
been so included. It should be obvious that ^APTH line addresses that
|
||
are NOT in the system's home Zone and Domain should NOT be added to
|
||
the SEEN-BY lines. If this feature is implemented, it may be a good
|
||
idea to give the sysop the ability to enable or disable it by means of
|
||
a command line switch or a configuration file option.
|
||
|
||
Note 4: If nodes with trailing modifier characters are inserted into
|
||
a ^APTH line for the purpose of indicating "SEEN-BY" nodes in a fully
|
||
coupled topology, it is permissible (but not required) to include
|
||
those nodes ONLY in the ^APTH lines of messages actually exported to
|
||
the nodes participating in the circular topology. In other words,
|
||
it's permissible to add such nodes to the ^APTH lines of messages
|
||
during the import cycle, in which case messages with ^APTH lines
|
||
containing the added nodes would be exported to all nodes. However,
|
||
it's also permissible to add those nodes to the ^APTH line during the
|
||
export cycle, including them only in the ^APTH lines of the nodes that
|
||
need to see them. Please keep in mind that such nodes are added only
|
||
to the END of the ^APTH line, AFTER the address of the system
|
||
processing the message. In any event, it's up to the software author
|
||
to implement this feature in such a manner that duplicates will not be
|
||
created.
|
||
|
||
Similarly, if a node RECEIVES a message containing a ^APTH line that
|
||
lists nodes with trailing modifier characters, it is permissible to
|
||
remove those nodes from the ^APTH line if it can be positively
|
||
ascertained that they are no longer required. Generally speaking,
|
||
this should NOT be done unless there is absolutely NO possibility of
|
||
the message being exported to one of the nodes in question. Note that
|
||
in most situations, if a ^APTH line contains a node with a trailing
|
||
modifier character, but it is followed by a node number (other than
|
||
your own) that does NOT have a trailing modifier character (that is,
|
||
the node with the trailing modifier character is not one of the last
|
||
nodes on the line), then it can usually be safely removed since it
|
||
will have already "passed through" the fully-coupled topology.
|
||
|
||
Using the previous example of 157/200, 154/9, and 154/970
|
||
participating in a fully-coupled topology, the ^APTH line as received
|
||
at 154/9 and 154/970 might end as follows:
|
||
|
||
..... 157/200 154/9! 970!
|
||
|
||
However, please note that if 157/200 also feeds other nodes that are
|
||
NOT part of this particular fully coupled topology, there is no real
|
||
reason they would have to see the "154/9! 970!" at the end of the
|
||
line. However, there is no prohibition against including those nodes
|
||
in the ^APTH lines of messages exported to other nodes.
|
||
|
||
Once this example message arrives at 154/9, the ^APTH line would be
|
||
changed to look like this:
|
||
FIDONEWS 14-09 Page 17 3 Mar 1997
|
||
|
||
|
||
..... 157/200 154/970! 9
|
||
|
||
Now, when this message is exported from 154/9 to another node (154/111
|
||
for example), that node may remove the "154/970!" as long as 154/9
|
||
remains in the ^APTH line, since as long as the message cannot be sent
|
||
back to 154/9, it cannot re-enter the fully-coupled topology. The
|
||
^APTH line at this point (after the message is received on 154/111)
|
||
might look like this:
|
||
|
||
..... 157/200 154/9 111
|
||
|
||
It would probably not be advisable to remove the "154/970!" at 154/9
|
||
in this example, even if the message has already been exported,
|
||
because the message might need to be re-exported (such as when a new
|
||
board picks up an echo feed).
|
||
|
||
When in doubt, nodes with trailing modifier characters (other than
|
||
your own) should be left in the ^APTH line. While there is a cost of
|
||
a few extra bytes per message if you leave them in, it does not
|
||
compare to the cost of the duplicate messages that could be generated
|
||
if they are removed indiscriminately.
|
||
|
||
Note 5: Messages sent to/from non-Fidonet-technology networks: When
|
||
a message originates in, or is sent to, a non-Fidonet-technology
|
||
network (a network that does not use the Zone:Net/Node.Point
|
||
addressing format), it is permissible to indicate this in the ^APTH
|
||
line by using the syntax "@Domain" standing alone. For example, a
|
||
message that comes into Fidonet via a gateway from the Internet might
|
||
show a ^APTH line as follows:
|
||
|
||
^APTH: @Internet 1:114/15@Fidonet 5 ...
|
||
|
||
Note that in the above example, the first Fidonet-technology address
|
||
must still contain, at a minimum, Zone, Net, Node, and Domain
|
||
information.
|
||
|
||
It's also permissible to show a non-Fidonet-technology network at some
|
||
point in the ^APTH line other than at the beginning, if for some odd
|
||
reason a conference starts out in a Fidonet-technology network, passes
|
||
through a non-Fidonet-technology network, and then is picked up by
|
||
another Fidonet-technology network. For example,
|
||
|
||
^APTH: [Fidonet addresses] ..... 114/5 15 @Internet
|
||
200:5000/400@Metronet
|
||
|
||
Note that "@Internet" stands alone in the above example, meaning that
|
||
the conference originated in Fidonet, passed into the Internet (where
|
||
the ^APTH line was not maintained), and then back into a Fidonet-
|
||
technology network (Metronet in this case). Note that any Fidonet-
|
||
technology address that follows a standalone Domain specifier must
|
||
contain, at a minimum, Zone, Net, Node, and Domain information.
|
||
|
||
The question immediately arises, how do you maintain the original
|
||
Fidonet-technology ^APTH line while the message passes through another
|
||
(non-Fidonet-technology) network? This could be left solely to the
|
||
discretion of the designers of the gateway software, but in order to
|
||
FIDONEWS 14-09 Page 18 3 Mar 1997
|
||
|
||
|
||
maintain a standard that can be followed by authors of different
|
||
gateway software packages, I suggest that the ^APTH line be converted
|
||
to one or more lines that start with the keyword FtnPth (For "Fidonet-
|
||
technology ^APTH line), with the @Domain address of the non-Fidonet-
|
||
technology network to which the message is being passed inserted as
|
||
the last entry in the list. For example, the following ^APTH line
|
||
|
||
^APTH: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 114/5 15
|
||
|
||
... would be converted to the following ASCII text line in the message
|
||
as sent to the Internet:
|
||
|
||
FtnPth: 3:711/431.5@Fidonet 431 403 1:124/4210 4115 114/5 15
|
||
@Internet
|
||
|
||
If the receiving network has a line length limitation, then it may be
|
||
necessary to break the ^APTH line into multiple FtnPth lines.
|
||
|
||
If the message is later passed back into a Fidonet-technology network,
|
||
the gateway software should ideally be able to take the FtnPth
|
||
information and convert it back to proper ^APTH line syntax, adding
|
||
the name of the network that the message was received from if not the
|
||
same as the last network indicated in the FtnPth line(s). Of course,
|
||
if no FtnPth lines exist in message, then the gateway software should
|
||
ideally create one, showing the network that the message was received
|
||
from as the first entry in the ^APTH line.
|
||
|
||
If this is done correctly (and if non-Fidonet-technology networks can
|
||
be persuaded to leave the FtnPth lines intact), duplicate message
|
||
detection can be maintained even if a message passes through a non-
|
||
Fidonet network. In addition, those in the other network will have
|
||
access to information showing where the message originated, which
|
||
systems it passed through, and where it entered their network, which
|
||
can be a big help in tracking problem messages. Finally, this
|
||
information can be used to prevent undesirable message paths (for
|
||
example, a message that enters Fidonet from a non-Fidonet-technology
|
||
network and then is later sent back into that same network at a
|
||
different gateway point, thus causing a potential duplicate message in
|
||
the other network).
|
||
|
||
Please note that in the above examples, references to @Internet are
|
||
for example purposes only, and are not intended to specify the
|
||
"correct" domain name (in preference to "UseNet" or "UUCP", for
|
||
example). Determination of the "correct" domain name for non-Fidonet-
|
||
technology networks may be left to those who operate the domain
|
||
gateways.
|
||
|
||
Jack Decker
|
||
October 7, 1990
|
||
|
||
Change History:
|
||
|
||
Version 001: 04/01/90 - Original document
|
||
Version 002: 10/07/90 - Added support for Domains, and other minor
|
||
modifications to the text (mostly error correction).
|
||
|
||
FIDONEWS 14-09 Page 19 3 Mar 1997
|
||
|
||
|
||
[Jack Decker is still around and wishes me to include his greeting to
|
||
FidoNet and give his Internet address for anyone who wishes to say
|
||
hello or discuss his FSC. He may be reached at:
|
||
|
||
jack@techknowtimes.com or jack@novagate.com
|
||
|
||
or his homepage at: http://www.novagate.com/~jack
|
||
|
||
He also recommends http://www.techknowtimes.com for tech types.] Ed.
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 20 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
COORDINATORS CORNER
|
||
=================================================================
|
||
|
||
|
||
Nodelist-statistics as seen from Zone-2 for day 059
|
||
By Ward Dossche, 2:292/854
|
||
ZC/2
|
||
|
||
+----+------+------------+------------+------------+------------+--+
|
||
|Zone|Nl-031|Nodelist-038|Nodelist-045|Nodelist-052|Nodelist-059|%%|
|
||
+----+------+------------+------------+------------+------------+--+
|
||
| 1 | 9877| 9729 -148 | 9527 -202 | 9527 0 | 9405 -122 |34|
|
||
| 2 | 16078|16067 -11 |16074 7 |16051 -23 |16116 65 |57|
|
||
| 3 | 863| 863 0 | 846 -17 | 812 -34 | 807 -5 | 3|
|
||
| 4 | 550| 549 -1 | 538 -11 | 541 3 | 541 0 | 2|
|
||
| 5 | 87| 87 0 | 87 0 | 87 0 | 87 0 | 0|
|
||
| 6 | 1072| 1072 0 | 1071 -1 | 1071 0 | 1088 17 | 4|
|
||
+----+------+------------+------------+------------+------------+--+
|
||
| 28527|28367 -160 |28143 -224 |28089 -54 |28044 -45 |
|
||
+------+------------+------------+------------+------------+
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 21 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
WE GET EMAIL
|
||
=================================================================
|
||
|
||
|
||
--- Following message extracted from NETMAIL @ 1:18/14 ---
|
||
By Christopher Baker on Sat Mar 01 19:57:39 1997
|
||
|
||
From: Christopher Baker @ 1:18/14
|
||
To: Bob Satti @ 1:1/0
|
||
Date: 01 Mar 97 19:54:10
|
||
Subj: looking for Internet links to FidoNet ops
|
||
|
||
CC: Bob Kohl, Martin Belcke, Dave Beach, Phillip Dampier
|
||
CC: Dave Miller, Marv Carson, B Becker, Dallas Hinton, Ken Tuley
|
||
CC: James Ray, Ward Dossche, David Nugent, Ariel Nardelli
|
||
CC: Henk Wolsink, Kazuyoshi Shinada, Bruce Bodger, Jason Steck
|
||
CC: Adrian Walker, Ed Georgen, Ken Wilson, Sid Balcom
|
||
CC: Marge Robbins, Brandon Carnahan, Brian Bonfietti, John Mudge
|
||
CC: Dave Anderson, Ben Hamilton, John Souvestre, George Peace
|
||
CC: Roy Timberman, Peter Witschi
|
||
|
||
in case you hadn't noticed, there is a new section in FidoNews that
|
||
lists FidoNet-related webpages and websites for Zones, Regions, and
|
||
Nets. these listings also appear on the official FidoNews webpage at:
|
||
|
||
http://ddi.digital.net/~cbaker84/fidonews.html
|
||
|
||
and at the FidoNews HTML page listed in the Masthead each week.
|
||
|
||
i would appreciate all ZCs and RCs passing this request down their
|
||
chain of command and to their ECs down the chain as well.
|
||
|
||
i would like to know about any and all FidoNet-related pages out
|
||
there. the only way i can get that info after little response to
|
||
FidoNews requests is to send you and your downlinks this Netmail.
|
||
|
||
for example, i have a listing for REC19 at ccove that no longer seems
|
||
to exist. REC19? did you drop or change your webpage?
|
||
|
||
Zones 4 and 5 don't have any links at all in the fidonet.org section.
|
||
ZC4 and ZC5, do you have webpages down and over there?
|
||
|
||
here is the current list as it appears in FidoNews:
|
||
|
||
This is a list of all FidoNet-related sites reported to the Editor as
|
||
of this appearance.
|
||
|
||
============
|
||
|
||
FidoNet:
|
||
|
||
Homepage http://www.fidonet.org
|
||
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
|
||
HTML FNews http://www.geocities.com/Athens/6894/
|
||
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
|
||
FIDONEWS 14-09 Page 22 3 Mar 1997
|
||
|
||
|
||
FTSC page http://www2.blaze.net.au/ftsc.html
|
||
Echomail http://www.portal.ca/~awalker/index.html
|
||
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
|
||
|
||
============
|
||
|
||
Zone 1: http://www.z1.fidonet.org
|
||
|
||
Region 10:
|
||
http://www.psnw.com/~net205/region10.html
|
||
|
||
http://www.dharmanet.org/BDO/net125.html
|
||
|
||
Region 15:
|
||
http://www.smrtsys.com/region15/
|
||
|
||
Region 16:
|
||
http://www.tiac.net/users/satins/region16.htm
|
||
|
||
http://www.tiac.net/users/satins/net330.htm
|
||
|
||
Region 17:
|
||
http://www.portal.ca/~awalker/region17.htm
|
||
|
||
Region 18:
|
||
http://www.citicom.com/fido.html
|
||
|
||
Region 19:
|
||
http://ccove.n-link.com/
|
||
|
||
============
|
||
|
||
Zone 2: http://www.z2.fidonet.org
|
||
ZEC2 http://fidoftp.paralex.co.uk/zec.htm
|
||
|
||
Region 25:
|
||
http://members.aol.com/Net254/
|
||
|
||
Region 29: http://www.rtfm.be/fidonet/ (in French)
|
||
|
||
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
|
||
|
||
Region 36: http://www.geocities.com/SiliconValley/7207/
|
||
|
||
============
|
||
|
||
Zone 3: http://www.z3.fidonet.org
|
||
|
||
============
|
||
|
||
Zone 4: (not yet listed)
|
||
|
||
============
|
||
|
||
Zone 5: (not yet listed)
|
||
|
||
FIDONEWS 14-09 Page 23 3 Mar 1997
|
||
|
||
|
||
============
|
||
|
||
Zone 6: http://www.z6.fidonet.org
|
||
|
||
============
|
||
|
||
-30-
|
||
|
||
would any of you care to add your Internet info for publication in
|
||
FidoNews and on the FidoNews webpage?
|
||
|
||
please pass this request along.
|
||
|
||
thanks.
|
||
|
||
QOFM.
|
||
Chris
|
||
FidoNews Editor [in case you've been out of touch for 8 months] [grin]
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 24 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
NET HUMOR
|
||
=================================================================
|
||
|
||
|
||
From: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
To: "Baker, Christopher" <cbaker84@digital.net (Christopher Baker)>,
|
||
Date: Thu, 20 Feb 97 08:15:31 -0600
|
||
Reply-To: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
|
||
Subject: From another list....
|
||
|
||
PC Humour
|
||
|
||
Q. What lizards like to sit on PCs?
|
||
A. Monitors.
|
||
|
||
Q. How do cold PC programmers feel?
|
||
A. IC.
|
||
|
||
Q. What do Wiccan computer experts ride in?
|
||
A. A hex bus.
|
||
|
||
Q. How do memory chip experts want their payment?
|
||
A. In cache.
|
||
|
||
Q. How do programmers write a debt notice?
|
||
A. I/O U.
|
||
|
||
Q. How did the Hunchback of Notre Dame surf the Net?
|
||
A. With a quasi-modem.
|
||
|
||
Q. How is Seagate like a rutted road?
|
||
A. They both make hard drives.
|
||
|
||
Q. What kind of lingerie do lady programmers like?
|
||
A. Softwear.
|
||
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
United States of A-moo-rica's state of the week:
|
||
|
||
Moonesota
|
||
|
||
-30-
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 25 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
Future History
|
||
|
||
17 May 1997
|
||
Independence Day, Norway.
|
||
|
||
25 May 1997
|
||
Independence Day, Argentina.
|
||
|
||
6 Jun 1997
|
||
National Commemoration Day, Sweden.
|
||
|
||
11 Jun 1997
|
||
Independence Day, Russia.
|
||
|
||
1 Jul 1997
|
||
Canada Day - Happy Birthday Canada.
|
||
|
||
13 Oct 1997
|
||
Thanksgiving Day, Canada.
|
||
|
||
1 Dec 1997
|
||
World AIDS Day.
|
||
|
||
10 Dec 1997
|
||
Nobel Day, Sweden.
|
||
|
||
12 Jan 1998
|
||
HAL 9000 is one year old today.
|
||
|
||
22 May 1998
|
||
Expo '98 World Exposition in Lisbon (Portugal) opens.
|
||
|
||
1 Dec 1998
|
||
Fifteenth Anniversary of release of Fido version 1 by
|
||
Tom Jennings.
|
||
|
||
31 Dec 1999
|
||
Hogmanay, Scotland. The New Year that can't be missed.
|
||
|
||
1 Jan 2000
|
||
The 20th Century, C.E., is still taking place thru 31 Dec.
|
||
|
||
15 Sep 2000
|
||
Sydney (Australia) Summer Olympiad opens.
|
||
|
||
1 Jan 2001
|
||
This is the actual start of the new millennium, C.E.
|
||
|
||
-- If YOU have something which you would like to see in this
|
||
Future History, please send a note to the FidoNews Editor.
|
||
|
||
-----------------------------------------------------------------
|
||
FIDONEWS 14-09 Page 26 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONET SOFTWARE LISTING
|
||
=================================================================
|
||
|
||
|
||
Latest Greatest Software Versions
|
||
by Peter E. Popovich, 1:363/264
|
||
|
||
All right, I admit it. I've been slacking off. I didn't get anything
|
||
done this week. Sigh.
|
||
|
||
The good news is that the old info section is down to under 40
|
||
percent, so we're seeing some real progress there.
|
||
|
||
Phased out this week: "OS/2 Systems" Section
|
||
|
||
Phase-out highlights:
|
||
This week: "Amiga" Section
|
||
Deadline for info: 14 Mar 1997.
|
||
Last week: "Atari ST/TT" Section
|
||
Deadline for info: 7 Mar 1997.
|
||
|
||
-=- Snip -=-
|
||
|
||
Submission form for the Latest Greatest Software Versions column
|
||
|
||
OS Platform :
|
||
Software package name :
|
||
Version :
|
||
Function(s) - BBS, Mailer, Tosser, etc. :
|
||
Freeware / Shareware / Commercial? :
|
||
Author / Support staff contact name :
|
||
Author / Support staff contact node :
|
||
Magic name (at the above-listed node) :
|
||
|
||
Please include a sentence describing what the package does.
|
||
|
||
Please send updates and suggestions to: Peter Popovich, 1:363/264
|
||
|
||
-=- Snip -=-
|
||
|
||
MS-DOS:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
Act-Up 4.6 G D Chris Gunn 1:15/55 ACT-UP
|
||
ALLFIX 4.40 T S Harald Harms 2:281/415 ALLFIX
|
||
Announcer 1.1 O S Peter Karlsson 2:206/221 ANNOUNCE
|
||
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BDOS_260.ZIP
|
||
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_DOS
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
CheckPnt 1.0 O G Michiel vd Vlist 2:500/9 CHECKPNT
|
||
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FASTECHO
|
||
FastEcho/16 1.45a T S Tobias Burchhardt 2:2448/400 FE16
|
||
FidoBBS (tm) 12u B S Ray Brown 1:1/117 FILES
|
||
FIDONEWS 14-09 Page 27 3 Mar 1997
|
||
|
||
|
||
FrontDoor 2.12 M S JoHo 2:201/330 FD
|
||
FrontDoor 2.20c M C JoHo 2:201/330 FDINFO
|
||
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GED
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
|
||
Imail 1.75 T S Michael McCabe 1:1/121 IMAIL
|
||
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
|
||
InfoMail 1.11 O F Damian Walker 2:2502/666 INFOMAIL
|
||
InfoMail/386 1.20 O F Damian Walker 2:2502/666 INFO386
|
||
InterEcho 1.19 T C Peter Stewart 1:369/35 IEDEMO
|
||
InterMail 2.29k M C Peter Stewart 1:369/35 IMDEMO
|
||
InterPCB 1.52 O S Peter Stewart 1:369/35 INTERPCB
|
||
IPNet 1.11 O S Michele Stewart 1:369/21 IPNET
|
||
JD's CBV 1.4 O S John Dailey 1:363/277 CBV
|
||
Jelly-Bean 1.01 T S Rowan Crowe 3:635/727 JELLY
|
||
Jelly-Bean/386 1.01 T S Rowan Crowe 3:635/727 JELLY386
|
||
JMail-Hudson 2.81 T S Jason Steck 1:285/424 JMAIL-H
|
||
JMail-Goldbase 2.81 T S Jason Steck 1:285/424 JMAIL-G
|
||
MakePl 1.9 N G Michiel vd Vlist 2:500/9 MAKEPL
|
||
Marena 1.1 beta O G Michiel vd Vlist 2:500/9 MARENA
|
||
Maximus 3.01 B P Tech 1:249/106 MAX
|
||
McMail 1.0 M S Michael McCabe 1:1/148 MCMAIL
|
||
MDNDP 1.18 N S Bill Doyle 1:388/7 MDNDP
|
||
Msged 4.10 O G Andrew Clarke 3:635/728 MSGED41D.ZIP
|
||
Msged/386 4.10 O G Andrew Clarke 3:635/728 MSGED41X.ZIP
|
||
Opus CBCS 1.73a B P Christopher Baker 1:374/14 OPUS
|
||
O/T-Track 2.63a O S Peter Hampf 2:241/1090 OT
|
||
PcMerge 2.7 N G Michiel vd Vlist 2:500/9 PCMERGE
|
||
PlatinumXpress 1.3 M C Gary Petersen 1:290/111 PX13TD.ZIP
|
||
QuickBBS 2.81 B S Ben Schollnick 1:2613/477 QUICKBBS
|
||
RAR 2.00 C S Ron Dwight 2:220/22 RAR
|
||
RemoteAccess 2.50 B S Mark Lewis 1:3634/12 RA
|
||
Silver Xpress
|
||
Door 5.4 O S Gary Petersen 1:290/111 FILES
|
||
Reader 4.4 O S Gary Petersen 1:290/111 SXR44.ZIP
|
||
Spitfire 3.51 B S Mike Weaver 1:3670/3 SPITFIRE
|
||
Squish 1.11 T P Tech 1:249/106 SQUISH
|
||
StealTag UK 1.c... O F Fred Schenk 2:284/412 STEAL_UK
|
||
StealTag NL 1.c... O F Fred Schenk 2:284/412 STEAL_NL
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL
|
||
Terminate 4.00 O S Bo Bendtsen 2:254/261 TERMINATE
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
TriBBS 10.0 B S Patrick Driscoll 1:372/19 TRIBBS
|
||
TriDog 10.0 M S Patrick Driscoll 1:372/19 TRIDOG
|
||
TriToss 10.0 T S Patrick Driscoll 1:372/19 TRITOSS
|
||
WaterGate 0.92 G S Robert Szarka 1:320/42 WTRGATE
|
||
WWIV 4.24a B S Craig Dooley 1:376/126 WWIV
|
||
WWIVTOSS 1.36 T S Craig Dooley 1:376/126 WWIVTOSS
|
||
xMail 2.00 T S Thorsten Franke 2:2448/53 XMAIL
|
||
XRobot 3.01 O S JoHo 2:201/330 XRDOS
|
||
|
||
OS/2:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
ALLFIX/2 1.10 T S Harald Harms 2:281/415 AFIXOS2
|
||
FIDONEWS 14-09 Page 28 3 Mar 1997
|
||
|
||
|
||
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BOS2_260.ZIP
|
||
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_OS2
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FE2
|
||
FleetStreet 1.19 O S Michael Hohner 2:2490/2520 FLEET
|
||
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GEO
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
|
||
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
|
||
Maximus 3.01 B P Tech 1:249/106 MAXP
|
||
Msged/2 4.10 O G Andrew Clarke 3:635/728 MSGED41O.ZIP
|
||
PcMerge 2.3 N G Michiel vd Vlist 2:500/9 PCMERGE
|
||
RAR 2.00 C S Ron Dwight 2:220/22 RAR2
|
||
Squish 1.11 T P Tech 1:249/106 SQUISHP
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL2
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
XRobot 3.01 O S JoHo 2:201/330 XROS2
|
||
|
||
Windows (16-bit apps):
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
|
||
FrontDoor APX 1.10 P S Mats Wallin 2:201/329 FDAPXW
|
||
|
||
Windows (32-bit apps):
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
|
||
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
|
||
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BW32_260.ZIP
|
||
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
|
||
GoldED 2.50 O S Len Morgan 1:203/730 GEO
|
||
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
|
||
Maximus 3.01 B P Tech 1:249/106 MAXN
|
||
Msged/NT 4.10 O G Andrew Clarke 3:635/728 MSGED41W.ZIP
|
||
PlatinumXpress 2.00 M C Gary Petersen 1:290/111 PXW-INFO
|
||
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAILNT
|
||
WinFOSSIL/95 1.12 r4 F S Bryan Woodruff 1:343/294 WNFOSSIL.ZIP
|
||
WinFOSSIL/NT 1.0 beta F S Bryan Woodruff 1:343/294 NTFOSSIL.ZIP
|
||
|
||
Unix:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
ifmail 2.9 M G Eugene Crosser 2:293/2219 IFMAIL
|
||
ifmail-tx ...tx7.9 M G Pablo Saratxaga 2:293/2219 IFMAILTX
|
||
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
|
||
Amiga:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
CrashMail 1.23 T X Fredrik Bennison 2:205/324 CRASHMAIL
|
||
CrashTick 1.1 O F Fredrik Bennison 2:205/324 CRASHTICK
|
||
FIDONEWS 14-09 Page 29 3 Mar 1997
|
||
|
||
|
||
DLG Pro BBOS 1.15 B C Holly Sullivan 1:202/720 DLGDEMO
|
||
GMS 1.1.85 M S Mirko Viviani 2:331/213 GMS
|
||
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
|
||
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
|
||
|
||
Atari:
|
||
Program Name Version F C Contact Name Node Magic Name
|
||
----------------------------------------------------------------------
|
||
BinkleyTerm/ST 3.18pl1 M F Bill Scull 1:363/112 BINKLEY
|
||
|
||
Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
|
||
C-Compression, F-Fossil, O-Other. Note: Multifunction will
|
||
be listed by the first match.
|
||
|
||
Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
|
||
X-Crippleware, D-Demoware, G-Free w/ Source
|
||
|
||
Old info from: 01/27/92
|
||
---------------------------------------------------------------------
|
||
|
||
MS-DOS Systems Other Utilities Other Utilities
|
||
-------------- Name Version Name Version
|
||
-------------------- --------------------
|
||
Network Mailers 2DAPoint 1.50* Netsex 2.00b
|
||
Name Version 4Dog/4DMatrix 1.18 OFFLINE 1.35
|
||
-------------------- ARCAsim 2.31 Oliver 1.0a
|
||
D'Bridge 1.30 ARCmail 3.00* OSIRIS CBIS 3.02
|
||
Dreamer 1.06 Areafix 1.20 PKInsert 7.10
|
||
Dutchie 2.90c ConfMail 4.00 PolyXarc 2.1a
|
||
Milqtoast 1.00 Crossnet 1.5 QM 1.00a
|
||
PreNM 1.48 DOMAIN 1.42 QSort 4.04
|
||
SEAdog 4.60 DEMM 1.06 RAD Plus 2.11
|
||
SEAmail 1.01 DGMM 1.06 Raid 1.00
|
||
TIMS 1.0(mod8) DOMAIN 1.42 RBBSMail 18.0
|
||
EEngine 0.32 ScanToss 1.28
|
||
Compression EMM 2.11* ScMail 1.00
|
||
Utilities EZPoint 2.1 ScEdit 1.12
|
||
Name Version FGroup 1.00 Sirius 1.0x
|
||
-------------------- FidoPCB 1.0s@ SLMail 2.15C
|
||
ARC 7.12 FNPGate 2.70 StarLink 1.01
|
||
ARJ 2.20 GateWorks 3.06e TagMail 2.41
|
||
LHA 2.13 GMail 2.05 TCOMMail 2.2
|
||
PAK 2.51 GMD 3.10 Telemail 1.5*
|
||
PKPak 3.61 GMM 1.21 TGroup 1.13
|
||
PKZip 1.10 GROUP 2.23 TIRES 3.11
|
||
GUS 1.40 TMail 1.21
|
||
NodeList Utilities Harvey's Robot 4.10 TosScan 1.00
|
||
Name Version HeadEdit 1.18 UFGATE 1.03
|
||
-------------------- HLIST 1.09 VPurge 4.09e
|
||
EditNL 4.00 ISIS 5.12@ WEdit 2.0@
|
||
FDND 1.10 Lola 1.01d WildMail 2.00
|
||
MakeNL 2.31 Mosaic 1.00b WMail 2.2
|
||
Parselst 1.33 MailBase 4.11a@ WNode 2.1
|
||
Prune 1.40 MSG 4.5* XRS 4.99
|
||
SysNL 3.14 MsgLnk 1.0c XST 2.3e
|
||
XlatList 2.90 MsgMstr 2.03a YUPPIE! 2.00
|
||
FIDONEWS 14-09 Page 30 3 Mar 1997
|
||
|
||
|
||
XlaxNode/Diff 2.53 MsgNum 4.16d ZmailH 1.25
|
||
MSGTOSS 1.3 ZSX 2.40
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
BBS Software Macintosh Other Software
|
||
Name Version --------- Name Version
|
||
-------------------- --------------------
|
||
FBBS 0.91 Network Mailers MacArd 0.04
|
||
Hermes 1.6.1 Name Version Mantissa 3.21
|
||
Mansion 7.15 -------------------- Mehitable 2.0
|
||
Precision Sys. 0.95b Copernicus 1.0 OriginatorII 2.0
|
||
Red Ryder Host 2.1 Tabby 2.2 PreStamp 3.2
|
||
Telefinder Host StuffIt Classic 1.6
|
||
2.12T10 Other Software SunDial 3.2
|
||
Name Version TExport 1.92
|
||
-------------------- TimeStamp 1.6
|
||
Point System ArcMac 1.3 TImport 1.92
|
||
Software AreaFix 1.6 Tset 1.3
|
||
Name Version Compact Pro 1.30 TSort 1.0
|
||
-------------------- EventMeister 1.0 UNZIP 1.02c
|
||
Copernicus 1.00 Export 3.21 Zenith 1.5
|
||
CounterPoint 1.09 Import 3.2 Zip Extract 0.10
|
||
MacWoof 1.1 LHARC 0.41
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
Amiga Network Mailers Other Software
|
||
----- Name Version Name Version
|
||
-------------------- --------------------
|
||
BBS Software BinkleyTerm 1.00 Areafix 1.48
|
||
Name Version TrapDoor 1.80 AReceipt 1.5
|
||
-------------------- WelMat 0.44 ChameleonEdit 0.11
|
||
4D-BBS 1.65 ConfMail 1.12
|
||
Falcon CBCS 1.00 ElectricHerald 1.66
|
||
Starnet 1.0q@ Compression FFRS 1.0@
|
||
TransAmiga 1.07 Utilities FileMgr 2.08
|
||
XenoLink 1.0 Name Version Fozzle 1.0@
|
||
-------------------- Login 0.18
|
||
AmigArc 0.23 MessageFilter 1.52
|
||
NodeList Utilities booz 1.01 Message View 1.12
|
||
Name Version LHARC 1.30 oMMM 1.50
|
||
-------------------- LhA 1.10 PolyXAmy 2.02
|
||
ParseLst 1.66 LZ 1.92 RMB 1.30
|
||
Skyparse 2.30 PkAX 1.00 Roof 46.15
|
||
TrapList 1.40 UnZip 4.1 RoboWriter 1.02
|
||
Zippy (Unzip) 1.25 Rsh 4.07a
|
||
Zoo 2.01 Tick 0.75
|
||
TrapToss 1.20
|
||
|Contact: Maximilian Hantsch 2:310/6| Yuck! 2.02
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
BBS Software Atari ST/TT
|
||
Name Version -----------
|
||
--------------------
|
||
FIDONEWS 14-09 Page 31 3 Mar 1997
|
||
|
||
|
||
FIDOdoor/ST 2.5.1 Network Mailers Other Utilities
|
||
FiFo 2.1v Name Version Name Version
|
||
LED ST 1.00 -------------------- --------------------
|
||
QuickBBS/ST 1.06* The Box 1.95* ApplyList 1.00@
|
||
Burep 1.1
|
||
Compression ComScan 1.04
|
||
Utilities NodeList Utilities ConfMail 4.10
|
||
Name Version Name Version Echoscan 1.10
|
||
-------------------- -------------------- FDrenum 2.5.2
|
||
ARC 6.02 ParseList 1.30 FastPack 1.20
|
||
LHARC 2.01i EchoFix 1.20 Import 1.14
|
||
PackConvert sTICK/Hatch 5.50 oMMM 1.40
|
||
STZip 1.1* Pack 1.00
|
||
UnJARST 2.00 Trenum 0.10
|
||
WhatArc 2.02
|
||
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
Key to old info:
|
||
+ - Netmail Capable (Doesn't Require Additional Mailer Software)
|
||
* - Recently Updated Version
|
||
@ - New Addition
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
|
||
Please send updates and suggestions to: Peter Popovich, 1:363/264
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 32 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONEWS PUBLIC-KEY
|
||
=================================================================
|
||
|
||
|
||
[this must be copied out to a file starting at column 1 or
|
||
it won't process under PGP as a valid public-key]
|
||
|
||
|
||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||
Version: 2.6.2
|
||
Comment: Clear-signing is Electronic Digital Authenticity!
|
||
|
||
mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
|
||
eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
|
||
Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
|
||
tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
|
||
JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
|
||
FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
|
||
c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
|
||
FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
|
||
1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
|
||
O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
|
||
UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
|
||
8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
|
||
ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
|
||
q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
|
||
3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
|
||
raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
|
||
FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
|
||
vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
|
||
X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
|
||
Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
|
||
toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
|
||
D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
|
||
SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
|
||
AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
|
||
v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
|
||
FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
|
||
WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
|
||
DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
|
||
EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
|
||
+Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
|
||
Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
|
||
aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
|
||
ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
|
||
=61OQ
|
||
-----END PGP PUBLIC KEY BLOCK-----
|
||
|
||
|
||
File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
|
||
Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
|
||
1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
|
||
the FidoNews homepage listed in the Masthead information.
|
||
|
||
-----------------------------------------------------------------
|
||
FIDONEWS 14-09 Page 33 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONET BY INTERNET
|
||
=================================================================
|
||
|
||
This is a list of all FidoNet-related sites reported to the Editor as
|
||
of this appearance.
|
||
|
||
============
|
||
|
||
FidoNet:
|
||
|
||
Homepage http://www.fidonet.org
|
||
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
|
||
HTML FNews http://www.geocities.com/Athens/6894/
|
||
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
|
||
FTSC page http://www2.blaze.net.au/ftsc.html
|
||
Echomail http://www.portal.ca/~awalker/index.html
|
||
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
|
||
|
||
============
|
||
|
||
Zone 1: http://www.z1.fidonet.org
|
||
|
||
Region 10:
|
||
http://www.psnw.com/~net205/region10.html
|
||
|
||
http://www.dharmanet.org/BDO/net125.html
|
||
|
||
Region 15:
|
||
http://www.smrtsys.com/region15/
|
||
|
||
Region 16:
|
||
http://www.tiac.net/users/satins/region16.htm
|
||
|
||
http://www.tiac.net/users/satins/net330.htm
|
||
|
||
Region 17:
|
||
http://www.portal.ca/~awalker/region17.htm
|
||
|
||
Region 18:
|
||
http://www.citicom.com/fido.html
|
||
|
||
Region 19:
|
||
http://ccove.n-link.com/
|
||
|
||
============
|
||
|
||
Zone 2: http://www.z2.fidonet.org
|
||
ZEC2 http://fidoftp.paralex.co.uk/zec.htm
|
||
|
||
Region 25:
|
||
http://members.aol.com/Net254/
|
||
|
||
Region 29: http://www.rtfm.be/fidonet/ (in French)
|
||
|
||
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
|
||
FIDONEWS 14-09 Page 34 3 Mar 1997
|
||
|
||
|
||
Region 36: http://www.geocities.com/SiliconValley/7207/
|
||
|
||
============
|
||
|
||
Zone 3: http://www.z3.fidonet.org
|
||
|
||
============
|
||
|
||
Zone 4: (not yet listed)
|
||
|
||
============
|
||
|
||
Zone 5: (not yet listed)
|
||
|
||
============
|
||
|
||
Zone 6: http://www.z6.fidonet.org
|
||
|
||
============
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
FIDONEWS 14-09 Page 35 3 Mar 1997
|
||
|
||
|
||
=================================================================
|
||
FIDONEWS INFORMATION
|
||
=================================================================
|
||
|
||
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
|
||
|
||
Editor: Christopher Baker
|
||
|
||
Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
|
||
Vince Perriello, Tim Pozar, Sylvia Maxwell,
|
||
Donald Tees
|
||
|
||
"FidoNews Editor"
|
||
FidoNet 1:1/23
|
||
BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds)
|
||
|
||
more addresses:
|
||
Christopher Baker -- 1:18/14, cbaker84@digital.net
|
||
cbaker84@aol.com
|
||
cbaker84@msn.com
|
||
|
||
(Postal Service mailing address)
|
||
FidoNews Editor
|
||
P.O. Box 471
|
||
Edgewater, FL 32132-0471
|
||
U.S.A.
|
||
|
||
|
||
voice: 1-904-409-3040 [1400-2100 ET only, please]
|
||
[1800-0100 UTC/GMT]
|
||
|
||
------------------------------------------------------
|
||
|
||
FidoNews is published weekly by and for the members of the FIDONET
|
||
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
|
||
of individual articles contributed by their authors or their
|
||
authorized agents. The contribution of articles to this compilation
|
||
does not diminish the rights of the authors. OPINIONS EXPRESSED in
|
||
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
|
||
FidoNews.
|
||
|
||
Authors retain copyright on individual works; otherwise FidoNews is
|
||
Copyright 1997 Christopher Baker. All rights reserved. Duplication
|
||
and/or distribution permitted for noncommercial purposes only. For
|
||
use in other circumstances, please contact the original authors, or
|
||
the Editor.
|
||
|
||
=*=*=*=*=*=*=*=*=
|
||
|
||
OBTAINING COPIES: The most recent issue of FidoNews in electronic
|
||
form may be obtained from the FidoNews Editor via manual download or
|
||
file-request, or from various sites in the FidoNet and Internet.
|
||
PRINTED COPIES may be obtained by sending SASE to the above postal
|
||
address. File-request FIDONEWS for the current Issue. File-request
|
||
FNEWS for the current month in one archive. Or file-request specific
|
||
back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
|
||
FIDONEWS 14-09 Page 36 3 Mar 1997
|
||
|
||
|
||
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
|
||
where mmm = three letter month [JAN - DEC] and y = last digit of the
|
||
current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.
|
||
|
||
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
|
||
1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
|
||
size from 48K to 1.4M.
|
||
|
||
|
||
INTERNET USERS: FidoNews is available via:
|
||
|
||
http://www.fidonet.org/fidonews.htm
|
||
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
|
||
ftp://ftp.aminet.org/pub/aminet/comm/fido/
|
||
|
||
*=*=*
|
||
|
||
You may obtain an email subscription to FidoNews by sending email to:
|
||
|
||
jbarchuk@worldnet.att.net
|
||
|
||
with a Subject line of: subscribe fnews-edist
|
||
|
||
and no message in the message body. To remove your name from the email
|
||
distribution use a Subject line of: unsubscribe fnews-edist with no
|
||
message to the same address above.
|
||
|
||
*=*=*
|
||
|
||
You can read the current FidoNews Issue in HTML format at:
|
||
|
||
http://www.geocities.com/Athens/6894/
|
||
|
||
STAR SOURCE for ALL Past Issues via FTP and file-request -
|
||
Available for FReq from 1:396/1 or by anonymous FTP from:
|
||
|
||
ftp://ftp.sstar.com/fidonet/fnews/
|
||
|
||
Each yearly archive also contains a listing of the Table-of-Contents
|
||
for that year's issues. The total set is currently about 11 Megs.
|
||
|
||
=*=*=*=
|
||
|
||
The current week's FidoNews and the FidoNews public-key are now also
|
||
available almost immediately after publication on the Editor's new
|
||
homepage on the World Wide Web at:
|
||
|
||
http://ddi.digital.net/~cbaker84/fidonews.html
|
||
|
||
There are also links there to jim barchuk's HTML FidoNews source and
|
||
to John Souvestre's FTP site for the archives. There is also an email
|
||
link for sending in an article as message text. Drop on over.
|
||
|
||
=*=*=*=*=*=*=*=*=
|
||
|
||
A PGP generated public-key is available for the FidoNews Editor from
|
||
FIDONEWS 14-09 Page 37 3 Mar 1997
|
||
|
||
|
||
1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
|
||
Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It
|
||
is also posted twice a month into the PKEY_DROP Echo available on the
|
||
Zone 1 Echomail Backbone.
|
||
|
||
*=*=*=*=*
|
||
|
||
SUBMISSIONS: You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission requirements are contained in the file
|
||
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
|
||
from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators
|
||
also have copies of ARTSPEC.DOC. Please read it.
|
||
|
||
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
||
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
|
||
and are used with permission.
|
||
|
||
"Disagreement is actually necessary,
|
||
or we'd all have to get in fights
|
||
or something to amuse ourselves
|
||
and create the requisite chaos."
|
||
-Tom Jennings
|
||
|
||
-30-
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|