textfiles/bbs/PASCO/pbm47.mag

1741 lines
102 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
º º
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ º
ɼ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ º
º Û ÜÜÜ Û Û ÜÜÜ Û Û ÜÜÜÜÛ Û ÜÜÜÜÛ Û ÜÜÜ Û º
ɼ Û ÜÜÜÜÛ Û ÜÜÜ Û ÛÜÜÜÜ Û Û ÛÜÜÜÜ Û ÛÜÛ Û º
º ÛÜÛ ÛÜÛ ÛÜÛ ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ º
º º
º ÜÜÜÜÜÜ ÜÜÜÜÜÜ ÜÜÜÜÜÜÜ º
Éͼ Û ÜÜ ÛÜ Û ÜÜ ÛÜ Û ÜÜÜÜÛ º
º Û ÜÜÜ Û Û ÜÜÜ Û ÛÜÜÜÜ Û º
ɼ ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ ÛÜÜÜÜÜÛ º
º º
ÉÍͼ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜ ÜÜÜÜÜ ÜÜÜ ÜÜÜ ÜÜÜÜÜÜÜ ÉÍÍͼ
º Û Ü Ü Û Û ÜÜÜ Û Û ÜÜÜÜÛ Û ÜÜÜ Û ÛÜÜÜ ÜÛ ÛÜ ÜÛ Û ßÛÛ Û Û ÜÜÜÜÛ º
ɼ Û Û Û Û Û ÜÜÜ Û Û ÛÜÜ Û Û ÜÜÜ Û ÜÛßÜÛÛÜ ÜÛ ÛÜ Û ÛÜß Û Û ÜÜÜÛÜ º
ɼ ÛÜÛßÛÜÛ ÛÜÛ ÛÜÛ ÛÜÜÜÜÜÛ ÛÜÛ ÛÜÛ ÛÜÜÜÜÜÛ ÛÜÜÜÛ ÛÜÛßÛÜÛ ÛÜÜÜÜÜÛ º
ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÊÍÍÍ»
º July 1996 Volume 4 Number 7 º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º Board of Trade BBS New Port Richey, Florida (813) 862-4772 º
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
In This Issue
-------------
þ Remembering Computers
Written by John Zagar
þ Remembering Computers Part II: Past Reflections
þ Computer Time Line
þ A Look at whitehouse.gov
þ Computer Basics
Written by Ed Garwood
þ Heretic Level Design Part II
Written by Paul Pollack
þ CDA Case Gives a History of the Internet
þ All the latest news and much more
+ + + + +
Editor's Welcome
----------------
Thank you very much for checking out this month's Pasco BBS Magazine!
When John Zagar send a short article called "Remembering Computers," we
decided to make that the theme of this month's issue. In one article, we have
extracted some of our favorite recollections of the early days of computers
from past issues of the magazine. There is also a "Computer Time Line" which
gives a history of the computer. I want to thank John Zagar for sending in
the inspiration for this issue.
This month we also log into the home page for the White House on the World
Wide Web and report on what was found at this very popular Internet site.
There is also part two of Paul Pollack's article on Heretic level design and
another installment of Computer Basics by Ed Garwood. There was also an
important court case dealing with the Communications Decency Act and we have
reprinted some of the court papers explaining the Internet. I think you will
find it very interesting reading. Of course, all our other regular features
are back, including the latest news.
Thanks for reading!
+ + + + +
ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
³ PASCO BBS MAGAZINE ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ Tampa Bay's Oldest Free On-line Magazine! ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ Member of the Association of Online Professionals ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ Member of the Electronic Frontier Foundation ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ EDITOR: Richard Ziegler ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ HOME BBS: Board of Trade BBS (813) 862-4772 ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ World Wide Web Home Page: http://www.sanctum.com/pasco ³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ
+ + + + +
Remembering Computers
---------------------
Written by John Zagar, Hudson, FL
Recently a group of my friends and I got into a discussion about our first
introductions to computers. I thought about my own experiences and saw how
far the computer has advanced in the past few years. It is surprising how few
people appreciate the advances in technology the home computer offers. Back
in the early 70's Radio Shack sold the Model I computer with 64K of RAM, this
didn't mean much to me because I had no idea what RAM was. My 14 year old son
and I had a new toy to play with. After reading the manual and learning the
BASIC Language we soon started to write simple programs and could store them
on a cassette recorder. This was a very slow process loading and saving
programs, but it was still fun.
A few years later Radio Shack offered their Model III with a 5 1/4 360K floppy
drive. We really thought we were Up-Town with this computer, transferring
data was fast and easy.
With the past experience writing BASIC programs I started to write Horse Race
Handicapping Programs. I could load my computer in the car and travel to
different motels in the cities where the races were held, and purchase the
Daily Racing Form and enter the information into the computer. Soon my
printer was printing out what it considered to be the winning horses. My win
percentage did increase slightly, besides I could now brag to my friends that
it was a computer pick.
Our next computer was an Epson QX-10. This computer offered us more graphics
and their Valdox word processor was very superior in those days. We later
added a MS-DOS board so that we could have CPM and IBM capabilities. As
prices dropped on the IBM Clones we bought our 286 16MHZ with 1 meg of RAM and
a whopping 20MEG Hard Drive and 5 1/4 & 3 1/2 floppies. We still could not
afford color so we were content with the amber monitor, it was a change from
the green screen and the old black & white days. This was my first indication
of how far the computer industry had advanced. If you had a computer running
at 8MHZ you would appreciate the 16MHZ speed. With the new games and programs
available we soon found a need for VGA, and a 2400 baud modem. We now had at
our fingertips files from the local BBSs and a chance to meet mew friends
through the message bases on the BBS.
I have upgraded my computer with a faster CPU more RAM and a larger hard
drive, a faster modem and a sound card. After seeing my own advances, I
wonder how many computer users really know what they have at their finger
tips.
I don't run a BBS, so I don't know much about them other than logging on to
their boards. I would be lost without them. I am now retired with a lot of
time on my hands, it is a pleasure to log on to a board and download an
interesting file, if I like it I register it. I like the try before you buy
concept. Thanks to all the System Operators of BBSs, you are an asset to
computer users, keep up the good work. You help make owning a computer a
pleasure.
Editor's Note: I want to thank John Zagar for sending in this article. If
you have any recollections from the early days of the personnel computer,
please send them along. We would be very happy to publish your thoughts in a
future issue.
+ + + + +
Remembering Computers Part II: Past Reflections
------------------------------------------------
Continuing with the theme for this month's issue, we present some of our
favorite recollections of the early days of computers. Over the last three
and one half years, the Pasco BBS Magazine has published many comments about
the earliest days of this industry. This article shares some of our favorite
extractions from past issues.
Popular game designer Nels Anderson talked about the pre-PC days in the very
first issue of the Pasco BBS Magazine. "I actually started programming way
back in the dark ages of computers, well before personal computers were
available. I was just in high school at the time and they had a PDP-8/L which
was hot stuff at the time (4K of memory, paper tape for I/O, and a Teletype).
I learned a lot from it and naturally some of the stuff I did was games. Very
few game ideas are totally original and that's been the case with all my
games. EGATrek was inspired by the classic minicomputer game, one of the
first computer games ever, that I've traced back at least as far as 1971.
SuperFly is actually an updated version of another pre-PC era computer game.
Where I worked we had a programmable computer terminal (the screen and
keyboard you use when connected to a minicomputer) and this terminal could
play exactly one game: 'Fly.' The terminal did not support graphics, so the
flies were just asterisks. A very simple game, it was still very addictive
and many lunch hours were spent moving the cursor around swatting asterisks.
Other programmers have had interesting recollections as well. Jetpack author
Adam Pedersen in the June 1993 issue: "I started programming on a Commodore
64 I got for Christmas. I actually started Jetpack on that, but I never got
very far on it. My parents would only let me use the computer for about an
hour a day, they thought all I did was play." Popular BBS utility author
Brent Yandel in the August 1993 issue: "Actually, I had been programming in
BASIC on any kind of home computer that came down the pike since 1981,
Commodore, Apple II, TI or whatever happen to be in the house." Ted Parker,
author of the Merlin Hurricane Tracking Tool, in the May 1995 issue: "I think
my first actual computer was a VIC-20."
Some of the comments by Sysops on the birth of their boards were also
enlightening. Ward Christensen setup the very first BBS and discussed it at
ONE BBSCON '93. Some of his reflections were published in the October 1993
issue. "What sort of hardware environment was it born on? Something that
would make you wonder how could it run. It was in fact a X-100. It had 64K
on it. Dual floppy disks, a quarter of a Meg a piece, with the 8" single
sided floppy of the day. And, a Hayes MicroModem 100. The software? The
program was written in 8080 assembler, somewhere in the tens of thousands of
lines of code."
In the March 1993 issue, Dan Linton talked of the birth of the Software
Creations BBS. "Software Creations started as an XT system with 2400 baud
lines." In the June 1993 issue Bob Mahoney talked about the birth of the
Exec-PC BBS. "I found myself with two IBM PCs, I had the largest collection
already of Shareware and free Public Domain software for the PC, I had a 30
megabyte hard drive, one of the biggest in the country for a PC and I had a
(1200 baud) modem. I started the bulletin board and it was a smash, hit,
success." In the June 1994 issue Richard Paquette talked about the early days
of the Livewire BBS. "I never even knew how to spell the word computer until
about 1986. A friend of mine bought a little Tandy, floppy driven. Then I
bought a Tandy with a little 20 Meg drive, a 300 baud modem and I started
playing around and I self-taught myself how to program. Once I learned that,
I started to run a bulletin board as a hobby, and everything grew from there."
In the February 1996 issue Mike Sussell talked about the early days of the
Invention Factory BBS. "I started on your basic PC with a ten meg hard drive.
It was a $5,000 PC that I actually paid IBM for. The modem, I think was $600
from Hayes at the time, 300 baud."
Pasco County Sysops have also shared some interesting recollections. Pasco's
first Sysop Ed Black in the April 1995 issue: "I had a spare Apple II E with
a pair of floppies sitting around, so I figured what the heck. So, I started
up Fast Eddie's BBS. I ran a 128K, Apple II E, with two 128K Apple single
sided single density floppy drives. A Hayes 300 baud SmartModem and a rotary
telephone line. I mean, not rotary like you think of it. No touch tone. The
biggest problem that I had was that my total storage on the system was 256K.
Actually less than that, because the program to run the board was about 40K
and that sat on one disk. These Apple double disk drives, the dual disks,
each disk stored 128K. That was it. It is like the stone age." Rob Marlowe,
Sysop of Pasco County's oldest BBS, in the February 1994 issue: "Back in
early 1985, two of my three younger brothers were running bulletin board
systems. Ron was running an Apple // system in Gainesville and Richard was
running an IBM system in Winter Park. We liked calling their systems and
decided to give BBSing a shot. The Inner Sanctum brought high speed (1200
bps) communications and a hard disk for storage (a whopping 10 meg drive).
All this running on a five slot IBM PC!"
As the computer industry forges ahead, it is always interesting to reflect
back on how it all began. Sometimes it is hard to believe how far we have
come in such a short period of time.
+ + + + +
ÕÑÑÑÑÑÑÑÑÑÑÑÑÑÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÑÑÑÑÑÑÑÑÑÑÑѸ
ÆØØØØØØØØØØØ Board of Trade BBS ØØØØØØØØØص
ÆØØØØØØØØØ New Port Richey, Florida ØØØØØØØص
ÆØØØØØØØ (813) 862-4772 ØØØØØص
ÆØØØØØ FidoNet: 1:3619/10 ØØØص
ÆØØØ Øص
ÆØ The Hobby BBS for the Entire Family! ص
³ ³
³ Pasco County's Information Source ³
³ Home of the Pasco BBS Magazine, DA BUCS and BBS Basics ³
³ ³
³ Call here FIRST for the BEST in Shareware ³
³ Official Distribution Site for the Most Popular Authors ³
ÆØ Øµ
ÆØØØ Supporting the Local Computer Community ØØص
ÆØØØØØ Local Author Support File Directory ØØØØص
ÆØØØØØØØ Official Support BBS for Pasco ComPats Computer Club ØØØØØØص
ÆØØØØØØØØØ ØØØØØØØص
ÆØØØØØØØØØØØ Member: AOP and EFF ØØØØØØØØØص
ÔÏÏÏÏÏÏÏÏÏÏÏÏÏÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÏÏÏÏÏÏÏÏÏÏÏϾ
+ + + + +
Computer Time Line
------------------
500 BC: The first abacus is created using wire and beads.
1642: Famous French philosopher and mathematician Blaise Pascal invents a
mechanical adding machine.
1670: German philosopher Wilhelm von Leibniz creates a calculator that could
perform multiplication.
1833: English inventor and mathematician Charles Babbage, known as "the
father of the computer," used a grant from the British government in an
attempt to make a demonstration model of a "difference engine." Colleagues
thought the idea was ridiculous, but Babbage is generally credited with
inventing the calculating machine. However, small imperfections could throw
the machine off and the government eventually withdrew its support. Babbage
conceived another model, the "Analytical Engine," which had several key
features of modern computers. The Countess of Lovelace, Augusta Ada Byron,
daughter of English poet Lord Byron, worked with Babbage and is considered the
world's first computer programmer. She developed instructions for doing
computations on the analytical engine and published a series of notes which
eventually allowed others to do what Babbage himself could not.
1880's: After the 1880 United States census took seven and one half years to
tabulate, the U.S. government held a competition to find a way to speed up the
process. American mechanical engineer and inventor Herman Hollerith's
tabulating machine won the contest. Hollerith's machine used electrical
power compared to the mechanical power that Babbage's creation used. An
unofficial count of the 1890 census was generated in six weeks.
1896: Realizing the financial potential of his new machine, Herman Hollerith
founded the Tabulating Machine Company.
1924: IBM was formed by the merger of the Tabulating Machine Company,
International Time Recording Company of New York and Dayton Scale Company.
Thomas John Watson, Sr. headed IBM from 1924 until his death in 1956.
1930: First large scale analog computer is built at the Massachusetts
Institute of Technology.
Late 1930's: Dr. John V. Atanasoff, professor of physics at Iowa State
University, along with an assistant Clifford Berry, created the first
digital computer which worked electronically. The electronic calculating
device was designed to assist students in solving mathematical problems and
was called ABC for the Atanasoff-Berry Computer.
1944: Mark I computer built by Harvard professor of mathematics Howard
Hathaway Aiken. Aiken had read the Countess of Lovelace's notes and decided
that a modern analytical engine was feasible. IBM gave him $1 million to
create the Automatic Sequence Controlled Calculator, which was eight feet high
and fifty-five feet long.
1946: The ENIAC (Electronic Numerical Integrator and Computer) was
demonstrated at the University of Pennsylvania at Philadelphia on February 14,
1946. ENIAC, the first all-electronic computer, covered 1,500 square feet,
weighed 30 tons, contained 600 switches and 17,468 vacuum tubes, and cost
$450,000. Designed by American physicist and research engineer Dr. John
Mauchley and American engineer John Presper Eckert Jr. to calculate artillery
firing tables, the computer could calculate a trajectory in five minutes
compared to forty hours with a desktop calculator. The ENIAC could handle
5,000 additions per second and proved the hydrogen bomb was physically
possible.
1947: Dr. John Mauchley and J. Presper Eckert Jr. form their own company and
begin work on UNIVAC, which was based on the ENIAC.
1950: UNIVAC (Universal Automatic Computer) is introduced as the first
commercial computer. The fifteen foot long UNIVAC correctly predicted that
Dwight Eisenhower would defeat Adlai Stevenson in the 1952 election after
analyzing about 5% of the vote.
1951: June 14, 1951, first UNIVAC computer is delivered to a client, the U.S.
Bureau of Census to tabulate the previous year's census.
1954: FORTRAN (FORmula TRANslator) computer language developed by IBM.
FORTRAN was the first high level computer language, and was primarily designed
for scientific and mathematical use. British Telecom developed the first
modem type device, which had a speed of 110 bps.
1956: Transistor developed at Bell Laboratories by John Bardeen, Walter H.
Brattain and William Bradford Shockley. The scientists received that year's
Nobel Prize for the invention.
1957: Magnetic tape introduced as method of storing data.
1959: COBOL (COmmon Business Oriented Language) developed under leadership of
Rear Admiral Grace Hopper (retired). COBOL was designed for use in the
business community. The integrated circuit was developed independently by
Jack Kilby (at Texas Instrument) and Robert Noyce (at Fairfield
Semiconductor). Noyce would go on to found Intel Corporation.
1961: The National Health Institute in Maryland is the first to use a
computer to monitor a patient.
1962: Ed Thorpe wrote Beat the Dealer, a book which used computer generated
hands to beat the casino at blackjack.
1964: BASIC (Beginners All-purpose Symbolic Instruction Code) developed at
Dartmouth College by professors John Kemeny and Thomas Kurtz. Under the
sponsorship of IBM, Gary Kildall wrote PL/1 (Programming Language One), the
first programming language for Intel's 4004.
1965: Integrated circuit begins replacing transistors in computers.
1966: First computer dating service opens in Cambridge Massachusetts called
Operation Match.
1969: Microprocessor developed by Intel Corporation design team headed by Ted
Hoff.
1970: Floppy disk introduced by IBM. UNIX developed by Ken Thompson and
Dennis Ritchie at AT&T's Bell Laboratories. Freedom of Information Act passed
by Congress.
1971: First pocket calculator introduced. It weighed 2.5 pounds, cost about
$150, and could only add, subtract, divide and multiply. The Pascal
programming language, named after the seventeenth-century French philosopher,
was developed by computer scientist Niklaus Wirth of Zurich, Switzerland.
Intel developed the 8008 microprocessor.
1972: Word processing is introduced. C programming language invented by
Dennis Ritchie at Bell Laboratories. DIALOG established as commercial
service. DIALOG grew out of a Lockheed Missiles and Space Company research
and development program begun in 1963.
1974: Ed Roberts creates the first PC, the Altair 8800. The Altair 8800 used
an Intel microprocessor and was named Altair after a destination in 1960's
television show Star Trek. John Torode and Gary Kildall developed the CP/M
disk operating system. The First Federal Savings and Loan, in Nebraska,
offered the first automatic teller machine on its outside wall. The Federal
Privacy Act was passed by Congress.
1975: The January 1975 cover of Popular Electronics featured the MITS Altair
8800 computer kit, which was the first microcomputer released in kit form in
the United States. 2,000 people mailed checks for the $397 kit featuring an
8-bit Intel 8080 processor with 256 bytes of RAM. Michael Shrayer developed
the "Electric Pencil" for the Altair, and later the Radio Shack Model I, which
was the first word processor for microcomputers. A teenage Bill Gates, along
with Paul Allen, created the Microsoft BASIC interpreter for microprocessors,
which meant programmers could develop PC applications software. Dick Heiser
opened "The Computer Store," the first retail computer store, in Los Angeles.
1976: Apple Computer formed by Steve Wozniak and Steve Jobs. The two Steves
began building the first Apple computer in their garage using $1,300 from the
sale of a Volkswagen. The World Altair Conference was held, which was the
first microcomputer conference. The CP/M (Control Program/Microcomputer) disk
operating system for MITS Altair went on sale.
1977: The Apple II is introduced as the first PC to generate color graphics.
The $1,300 machine had 4K of RAM and a jack to connect to your television.
Radio Shack introduced the Tandy TRS 80 Model computer. Commodore Business
Machines introduced the PET (Personal Electronic Transactor) computer.
Computerland opened its first franchise in Morristown, New Jersey.
1978: On February 16, 1978, Ward Christensen and Randy Suess put the first
BBS on-line. CBBS, an acroym for Computerized Bulletin Board System, was
created during a Chicago blizzard. The Apple II+ added a floppy drive to the
PC. Hayes Microcomputer Products, Inc. was founded in 1978.
1979: VisiCalc, the first spreadsheet program, is introduced. VisiCalc,
written by Dan Bricklin and Robert Frankson, was produced by Personal Software
Source and released for the Apple II. Tandy introduced the TRS-80 Model II
and the word processing software WordStar was released by MicroPro.
CompuServe opened its service to microcomputer users.
1980: With over 2 million PCs in use in the United States, IBM establishes a
PC development team. The first LAN, Local Area Network, becomes available.
Ada, named after the Countess Ada Lovelace, is developed by the Pentagon as a
standard language for weapons systems. In December 1980, Apple stock was
offered to public and became quite popular with investors.
1981: IBM joins the PC market in August with a machine using an Intel 8088
microprocessor and Microsoft's DOS operating system. That first IBM PC had
two floppy disk drives, a monochrome monitor and cost $3,200. While IBM
predicted modest sales, they had the top market share within eighteen months.
IBM licensed the DOS operating system from Microsoft who then licensed DOS to
others. Microsoft reportedly paid $75,000 for the core code from a Seattle
software developer. Apple placed an ad in the trade press which read:
"Welcome, IBM! Seriously." Apple thought that IBM's entry in the market
would give the personal computer a more serious image. Also in 1981, the
Delphi on-line service was founded and Chuck Forsberg introduced the YModem
protocol. The V.21 modem standard was developed for 300 bps and Hayes
released a 300 baud modem.
1982: PC Magazine was introduced in February 1982. The V.22 modem standard
was developed and the 1200 baud modem introduced. Compaq Computer Corp. was
founded in Houston, which started the IBM clone market and made IBM the
industry standard. Andrew Fluegelman (PC-Talk) and Jim Button (PC-File)
attempted the first Shareware type marketing. Timex-Sinclair announced the
first computer priced under $100, which was a small unit that attached to the
television set. Commodore began selling the Commodore 64, a $595 unit with
64K of RAM, and the Apple III was introduced. Time Magazine named the
computer as their "Man of the Year."
1983: Lotus 1-2-3, a spreadsheet program written by Mitch Kapor, is released.
IBM introduced the PC-XT with a 4.77 MHz 8088 processor. The XT had a ten
megabyte hard drive and was the first computer to have a hard drive.
Microsoft Word was introduced, as was the IBM PC Jr. In November 1983, Tom
Jennings introduced the FidoNet message network for BBSs. The Exec-PC BBS
went on-line in suburban Milwaukee, Wisconsin.
1984: The heavily promoted Apple Macintosh was introduced in mid-January.
The Software Publishers Association is founded on April 5, 1984. The V.22 bis
modem standard is developed and 2400 baud modems are introduced. In August
1984, the IBM PC AT introduced with a 6 MHz 286 processor, 512K of RAM, a 20
meg hard drive and a cost of $5,795. The Computer Fraud and Abuse Act is
passed by Congress and laser printers are introduced for microprocessors.
Over the Winter of 1984-85, Ed Black sets up the first BBS in Pasco County.
Fast Eddie's BBS ran on an Apple II E with two 128K floppy drives and a Hayes
300 baud modem.
1985: On March 8, 1985, the Inner Sanctum BBS comes on-line and it remains
Pasco County's oldest BBS. PC Magazine established the PC MagNet, which is an
on-line service to provide access for readers to programs, articles, databases
and editorial staff. The Whole Earth 'Lectronic Link, better known as the
WELL, goes on-line. IBM signed an agreement with Microsoft to develop OS/2
and discontinued production of the IBM PC Jr. The first computer mart, called
Infomart, opened in Dallas with 90 stores devoted to computer related
businesses. Version 1.0 of Windows was released in November 1985. Commodore
introduced the Amiga computer, priced at $1,295, late in 1985.
1986: Compaq Computer released the Deskpro 386, the first 80386 based PC.
Chuck Forsberg introduced the ZModem protocol.
1987: The V.32 modem standard developed and 9600 baud modems introduced.
Boardwatch Magazine is first published in March 1987 and the Association of
Shareware Professionals is formed in April. April 1987 also saw IBM introduce
the PS/2 family of PCs, featuring a nonstandard architecture and the OS/2
operating system. IBM was attempting to take back control of the personal
computer market, but sales were unimpressive and the strategy proved
disastrous. WordPerfect 4.2 is released and became the all-time most
successful word processor.
1988: The Prodigy on-line service begins operation.
1989: A computer by the name of "Deep Thought" beat master chess player David
Levy, who had been beating computers since 1968, however, world champion Garry
Kasparov easily defeated Deep Thought. Microsoft announced plans to
concentrate on Windows rather than OS/2.
1990: In May 1990, Microsoft releases Windows version 3.0. On July 10, 1990,
the Electronic Frontier Foundation was formed.
1991: The V.32 bis modem standard developed and 14,400 baud modems are
introduced. IBM and Apple announced an alliance to develop microprocessors
and software. In August 1991, a BBS related convention known as FIDOCON91 was
held in Denver.
1992: Microsoft released Windows version 3.1. In May 1992, Apogee Software
releases id Software's landmark Shareware game Wolfenstein 3-D. In June 1992,
the Board of Trade BBS comes on-line in New Port Richey, Florida. On August
13, 1992, the first ONE BBSCON was held at Denver's Stouffer Concourse Hotel.
1993: The Pasco BBS Magazine is introduced with the January 1993 issue.
Microsoft introduces Windows NT as the operating system for corporate networks
and power users. Intel introduced the Pentium computer chip and IBM released
OS/2 Warp. The first 28,800 baud modems appeared using the V.FC standard. In
August 1993, id Software released the Shareware game Doom: Evil Unleashed.
1994: The V.34 modem standard was developed for 28,800 baud modems.
1995: On August 20, 1995, the last ONE BBSCON closes at the Tampa Convention
Center in Tampa, Florida. Amid much hype, Microsoft released Windows 95 on
August 24, 1995.
1996: The 50th anniversary of the ENIAC computer is celebrated at the
University of Pennsylvania at Philadelphia. Vice President Al Gore
commemorated the anniversary by restarting the ENIAC for the first time in
forty years. Also being held in conjunction with the anniversary was a chess
match between IBM super-computer Deep Blue and world chess champion Garry
Kasparov. On February 10, Deep Blue defeated Kasparov in the first match of
the six match game series. It was the first time a computer had beaten a
grandmaster under strict tournament conditions. On February 17, the series
concludes with Kasparov winning three games, Deep Blue winning once and two
games resulting in draws.
+ + + + +
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
ÛÛÛ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛßß ßßÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛß ßÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛ The ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÜÜ ßÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛ ÛÜ ÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛ Electronic ÛÛÛÛÛÛÛÛ ÛÛÛÛ Û ÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛ Frontier ÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛ Ûß ÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛÛÛ Ûß ÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛ Foundation ÛÛÛÛÛÛÛÛ ß ÜÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÜ ÜÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÜÜ ÜÜÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛ ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ ÛÛÛ
ÛÛÛÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÛÛÛ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ Fighting for our on-line rights! ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
ÛÛÛ 1001 G Street NW, Suite 950 East, Washington, DC 20001 ÛÛÛ
ÛÛÛ (202) 347-5400 (Voice), (202) 638-6120 (BBS), eff@eff.org (Internet) ÛÛÛ
ÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛÛ
+ + + + +
A Look at whitehouse.gov
------------------------
"Good Evening. Welcome to the White House." This is the message you will
see, if you log into http://www.whitehouse.gov some night. You will also be
greeted with a very nice digitizied image of the White House. The home page
for the President of the United States is one of the most popular on the
Internet's World Wide Web. However, this site is much more than nice
graphics.
If you click on the image of President Clinton and Vice President Gore, you
learn about "The President & Vice President: Their accomplishments, their
families, and how to send them electronic mail." Click on the calendar icon
and find out "What's New: Vice President Gore launches CyberED to provide
hands-on education technology experience across the country." A Presidential
seal icon leads one to the "Interactive Citizen's Handbook: Your guide to
information and services from the Federal government." Click on the image of
George Washington and read about the "White House History and Tours: Past
Presidents and First Families, Art in the President's House and Tours." An
icon of a book will take one to "The Virtual Library: Search White House
documents, listen to speeches, and view photos." Click on the podium icon and
enter "The Briefing Room: Today's releases, hot topics, and the latest
government statistics." A question mark icon will guide one to the "White
House Help Desk: Frequently asked questions and answers about our service."
There is also a "White House for Kids: Helping young people become more
active and informed citizens."
The Federal government continues to make more information available on-line
and whitehouse.gov is jammed full of data. Want to learn more about politics
or history, this is a good place to start. One visit and you will realize why
it is such a popular site.
+ + + + +
Computer Basics
---------------
Written by Ed Garwood, Hudson, FL
Backing Up Files
Computer owners are continually being warned to "back up" their files. This,
of course, is excellent advice, something like taking out insurance. The only
trouble is that many people do not know just what this means, and many more
have not the faintest idea how to "back up". This article, while not the
ultimate word on the subject, will at least provide a little information on
the subject.
First of all, what does the term "back up" really mean. Basically, it means
to copy certain programs or files to another place, from which they can be
recovered if the original programs/files are lost. Something like hiding a
spare key to your car under the bumper or with the gas cap. You lose your
key, you have a back-up one. So it is with computer files. The computer,
wonderful machine that it is, is NOT perfect. Next week, next month, next
year, some time will come the day when you find one or more of your files are
unobtainable. Whether you accidently erased them, whether they somehow became
corrupted, or whether your hard drive crashed, is of no material importance.
The fact is that they are GONE!!! If you were clever enough to have made
back-up copies, you need only restore them to their rightful place, and you
are back in business again. If not, as Blondie and Dagwood have been told,
"Tough Patootie."
How, then, do you make back-ups? Assume you have just bought a copy of
Quicken Version 17.3a, which came on 4 3« inch HD disks. Before you try to
install this program, get 4 3«" blank HD disks. Take the first Quicken disk
and put it into your A drive (or B drive, as the case may be). Type DISKCOPY
A: A: and press <Enter>. (If you're using the B drive, the command is
DISKCOPY B: B:) You'll be prompted to put the source disk into the drive
(which you have just done). The drive light will go on and the first disk of
Quicken will be copied into a temporary memory. Soon, you will be told to
remove the disk and replace it with the target disk (this will be the first
blank disk) and press <Enter>. When that disk has been filled, you will be
prompted to put the next source disk in the drive, and so on, until all four
disks have been copied. Put the original disks away in a safe place, and use
the back-up disks you just made to install your program on the hard disk,
according to the instructions in the manual. You have just made back-up
copies of your program disks.
NOTE: In the instance above, you can copy this way ONLY to a disk that is
exactly the same as the source disk. Other wise, you will get an error
message that the disks are not compatible.
Copying under WINDOWS.
The procedures under Windows are somewhat different. For instance, you will
not see the term Diskcopy in Windows, although you can actually accomplish the
same effect. First, open your File Manager. Assuming you will copy from A
drive, click on the A (upper left corner of the window). Now, to make a copy
of your disk (Like DISKCOPY), click on the DISK heading, and then click on
'Copy Disk'. A new window will open, and you will see that the two boxes
therein already are set for Drive A. Click on OK and follow further prompts.
The other type of "back up" comes later, when you have generated data files,
and wish to save them. No need to back-up the entire program, since you
probably have already have copies of the program.
In the versions of DOS, up to and including Version 5.0, DOS had a very good
back up program as a part of DOS, with which to back up files. Version 6.0
and Windows 3.1 came up with new backup programs, called MSBACKUP and MWBACKUP
respectively. Backing up with these new files is somewhat involved, and you
should read the appropriate manual.
Now, let us assume that you have been using WordPerfect for your
correspondence. You have written quite a bit, and you would like to back up
those files, to save them in a safe place. We'll also assume that you saved
all of your correspondence with the .WPM extension, and that it is in the
Files subdirectory of WordPerfect (i.e. WP\FILES). There are a couple of ways
to make your back-ups. If you want to save the correspondence files to a
single disk, (on the A Drive) , put a formatted disk in the A drive, go to the
A prompt, and type XCOPY c:\WP\files\*.WPM a: and press <Enter>. What we have
done here is tell the computer 'Copy all of the files in the Files
subdirectory of WordPerfect, which have the extension .WPM, and put them on
the disk in the A drive'. But, suppose you have so many files that one disk
wouldn't hold them all. Here's what you do. First, at the A prompt, type the
following: Attrib +A c:\WP\files\*.WPM and press <Enter>. NOTE: This gives
the 'archive' attribute to all of those files. Then, type XCOPY
c:\WP\files\*.WPM a: /m and press <Enter>.
The drive will start copying files, and when the disk is full, it will display
the message "Insufficient Disk Space" and state how many files were copied.
At this point, remove the first disk, and replace it with a second disk.
Press the F3 key, and then press <Enter>. The drive will resume the copying.
Continue this until all of those files have been copied. You have now backed-
up your correspondence files. If you wish to copy them back later on, put the
disk in the A: drive and just type: XCOPY A:\*.* c:\WP\files and press
<enter>. Continue until all files have been transferred.
If you have the BACKUP.EXE file in DOS, you need only type, at the C: prompt,
BACKUP C:\WP\FILES\*.WPM A: press <Enter>, and follow the prompts. Note that
if you use more than one floppy disk, they are numbered consecutively. To
restore the files later, put the #1 disk in the A drive, and type RESTORE
A:*.* c:\WP\FILES. NOTE: You MUST Restore files which were backed up using
BACKUP to they directory from which they were copied.
Should you just want to back up one or two files, the COPY command will work
well. The syntax is COPY C:\WP\FILES\filename.WPM A:. The same type command
can be used to restore the files to their original place.
There are some commercial programs which will do the back-up job. Among them
are Norton BackUp, PC Tools, and a shareware program called BAC. To use the
latter, type BAC C:\WP\Files\*.WPM a:. To restore them later, use the XCOPY
command as above. There are also tape units, which allow you to back up your
files on tape, rather than floppy disks. You can put about 100 MB of data on
a tape unit.
Editor's Note: Look for another installment of Computer Basics in next
month's issue. Ed Garwood may be contacted by leaving a message on the Board
of Trade BBS at (813) 862-4772. He is also active in the Pasco ComPats
Computer Club. The club meets the second and fourth Thursday of the month at
the New Port Richey City Council Chambers at the intersection of Main and
Madison Streets in New Port Richey, Florida. For more information about the
Pasco ComPats Computer Club, contact club President Robert Donbar at (813)
863-3963.
+ + + + +
*****************************************************************************
ATTENTION to Details BBS Clint Bradford, KE6LCS - Sysop
Mira Loma, California BBS (909) 681-6221 BBS
Excellence...Across the Board!(sm) Voice Support (909) 681-6210
Supporting BBS Member: AOP - Association of Online Professionals
ASP - Association of Shareware Professionals
EFF - Electronic Frontier Foundation
ESC - Educational Software Cooperative
NCSA - National Computer Security Association
Message Networks: MustangNet USNet CoveNet Internet
MysticNet ILink HamRadioNet
Official Bulletin Station of the ARRL - American Radio Relay League
ATTENTION to Details BBS is managed in compliance with the
AOP and NCSA Codes of Professional Standards
*****************************************************************************
+ + + + +
EFF Quote of the Month
----------------------
"Information wants to be free."
- Stewart Brand, EFF boardmember, founder of Whole Earth Catalog and the WELL.
Editor's Note: The Electronic Frontier Foundation Quote of the Month is a
collection of the wittiest and stupidest, most sublime and most inane comments
ever said about cryptography, civil liberties, networking, government,
privacy, and more. For more information on the Electronic Frontier
Foundation, contact the EFF via the Internet, phone, fax, or US Mail. The
Electronic Frontier Foundation, 1001 G Street NW, Suite 950 E, Washington, DC
20001, (202) 347-5400 (voice), (202) 393-5509 (fax), (202) 638-6119 (BBS),
Internet: ask@eff.org.
+ + + + +
²²²²± ²²± ²²± ²²± ²²²²²²²± ²²± ²²± ²²²²± THE NEWS
²²± ²²± ²²± ²²± ²²²± ²²± ²²± ²± ²²± ²²± ²²± ²²± DIRECTORY
²²± ²²± ²²± ²²²²±²²± ²²±²± ²²± ²²± ²²²±
²²± ²²± ²²±²²²²± ²²²²± ²²±²±²²± ²²²± A brief look
²²± ²²± ²²± ²²²± ²²±²± ²²²²²²²± ²²²± at some of
²²± ²²± ²²± ²²± ²²± ²²± ²²± ²± ²²²±²²²± ²²± ²²± the news of
²²²²± ²²± ²± ²²± ²²± ²²²²²²²± ²²± ²²± ²²²²± the month
AT&T has been deluged with requests for its WorldNet Internet service, which
they announced on February 27 would feature five free hours of access each
month for one year. Over 150,000 customers have been signed up, however,
600,000 have made requests to do so. Reports claim people have waited months
to get the required software, the customer support help lines have been
overwhelmed, the technical support has been lacking and that the software has
had several bugs. AT&T, along with other major telecommunications companies,
are having difficulties joining Internet Service Provider market.
ONE, Inc. has announced that ONE ISPCON '96 (formerly known as ONE BBSCON)
will not feature a Sunday schedule for this year's event. The convention will
be held from Wednesday August 7, 1996 to Saturday August 10, 1996 in San
Francisco.
A home page for this summer's centennial Olympic Games in Atlanta has been set
up on the World Wide Web at http://atlanta.olympic.org.
Democrats in the United States House of Representatives are complaining that
the Republicans are only listing the Democratic committee home pages on the
House Web Page's main menu. Democrats claim that people will have go through
Republican rhetoric to access their views. The Republicans claim that the new
policy guarantees a Web page for the minority party. The page is located at
http://www.house.gov.
Clark Gilbo has announced that his Pasco BBS Listing will be renamed Pasco BBS
Quarterly and released four times a year. The list of bulletin board systems
in western Pasco and northern Pinellas counties will be released in June,
September, December and March. There could also be intermediate updates if
the need arises. Clark Gilbo has been publishing BBS listings since 1992,
when he introduced the Westcoast 813 BBS Directory, which was later renamed
the 813 BBS Directory. The first Pasco BBS Listing came out earlier this
year.
+ + + + +
ROTFL!
------
Computer humor courtesy of Sandy Illes
Favorite Flames Number I
You obviously have so much on your mind that there isn't room left for any
brains. Some people are "has-beens," you're a "never-was." Whatever is
eating you must be suffering horribly. Some day you'll find yourself - and be
truly disgusted.
Your attempts at humor are greeted by tremendous bursts of silence, and if you
changed your mind, I wonder where you'd put the diaper. You're proof that
lack of brainwave activity is not a sign of death.
Favorite Flames Number II
You are truly pathetic. Not to be confused with imitation pathetic or
facsimile pathetic. Have you not considered that brain surgery would be a
minor operation for you? Your unimportance is matched only by your
insignificance. Since you already have an electric typewriter, I'd like to
suggest that you find a matching chair.
Favorite Flames Number III
Hello there, tall, dark and obnoxious.
It's possible that you may be a beautiful person on the inside.
Unfortunately, it's the outside that shows.
It's obvious that you have a lot on your mind - too bad there wasn't any room
left for brains. Arguing with you is like trying to blow out a light bulb.
If I ever said anything nice about you, please cancel it. Oh, and tell your
mother to spit in your face for me.
Favorite Flames Number IV
I considered replying to your inarticulate, injudicious, and unintelligible
message, but reconsidered after considering the possibility that others might
accidentally believe that I know you.
Please desist from this sick compulsion to intellectually barf all over the
net.
Favorite Flames Number V
It's disheartening to know that you're still alive and inflicting your curse
of momentary consciousness upon the masses via echomail. If you are unable to
get a life, I implore you to get a death.
Editor's Note: Thank you to ROTFL Digest!, and its editor Sandy Illes for
allowing the above to be reprinted from a prior issue of the on-line humor
magazine. ROTFL Digest! is published by Access Media Systems, which may be
contacted at (905) 847-7143, or (905) 847-7362. You may also email Sandy
Illes at sandyi@pathcom.com, or visit their home page on the World Wide Web at
http://www.pathcom.com/~sandyi.
+ + + + +
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
º º
º ßÛß ÛßßÛ ÛßßÛ Ûßßß ÛßÛ Ûßßß ÛßßÛ ÛßßÛ ÛßßÛ ßßÛßß Û Û ÛßÛßÛ º
º Û Û Û Û Û Ûß ÛßßÛ ßßßÛ ÛßßÛ Û Û Û Û Û Û Û Û Û º
º ßßß ß ß ß ß ßßßß ß ß ßßßß ß ß ß ß ßßßß ß ßßßß ß ß º
º º
º ÛßÛ ÛßÛ Ûßßß º
º ÛßßÛ ÛßßÛ ßßßÛ º
º ßßßß ßßßß ßßßß º
º º
º Since 1985 - Pasco County's Oldest BBS º
º º
º Sysops - Rob & Carolyn Marlowe º
º º
º Popular Chat Board, On-Line Games, CD-ROMS, Internet, FidoNet º
º º
º Ten Lines - (813) 848-6055 Voice - (813) 845-0893 º
º º
º telenet: sanctum.com º
º º
º READ THE PASCO BBS MAGAZINE AT: http://www.sanctum.com/pasco º
º º
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
+ + + + +
PBM Flashback - July 1994
-------------------------
In the July 1994 issue of the Pasco BBS Magazine, Rob Kittredge was
interviewed for an article on his new program QFront. The program was
designed to give PCBoard Sysops an easy way to get FidoNet up on their system.
QFront was quite successful and had been named one of the favorite add-ons for
PCBoard. A version for Wildcat! would come out later. Here is some of what
Rob Kittredge said in that issue two years ago.
"All I wanted to do was fill a gap that PCBoard had when interfacing with
Fido, there is no other FidoNet mailer compatible with PCBoard like QFront is.
That was one of my major goals, along with ease of set-up and ease of use for
the average user. QFront has better context sensitive help, as every item has
a help display on the bottom of the screen. As you move through each field it
tells you, briefly with a one line description, what you are doing. You can
press F1 to get a more detailed help display for the field you are editing."
Editor's Note: PBM Flashback will appear on a regular basis in future issues.
Each issue will have this brief look back at some of the features which have
appeared over the history of the Pasco BBS Magazine.
+ + + + +
When You Just Can't Wait: A Guide to Shareware Heretic Level Design (Part II)
------------------------------------------------------------------------------
"A not-so-quick, but still dirty, guide to shareware Heretic level design."
Written by Paul Pollack, New Port Richey, Florida
DISCLAIMER: I cannot be held responsible for the prohibited distribution of
levels for the Shareware version. Please respect id's wishes and only use
this while waiting for your registered version to arrive. Do not distribute
levels compatible with the Shareware version, as this is prohibited by id.
Miscellaneous Items
A. Using Heretic texture names/what they look like
Another option (and one perhaps better than simply using Doom only textures;
especially in Doom ][) when designing a level is to use Heretic texture names;
DM2CONV doesn't touch 'em, and if you know what they look like (and your
editor allows you to use their names), you can pretty much get the desired
results. But how do you know what the texture names are in Heretic? Just
download the last issue of GamePlay Magazine from the Board of Trade BBS for a
list of textures found in the shareware version of Heretic from DeuTex.
Of course, this doesn't really give you that good of an idea of what the
textures actually look like; besides, this only covers the actual wall
textures. So what's a shareware PWAD editor to do?
Originally I was planning to include a series of high resolution SVGA 640x480
GIF files, created with the Graphic Workshop for DOS, containing a catalog of
the available floor textures and wall patches. But after thinking this over,
I realized that I had serious questions about the legality of such a move, and
so I'll detail how to create them yourself:
First off, you'll need DeuTex v3.1, by Olivier Montanuy and docs by HevKev
(Kevin McGrail). Then use the
DeuTex -FLATS -PATCHES -DOOM d:\heretic -XTRACT d:\heretic\heretic1.wad
command to extract the floor, ceiling, and wall patches to their respective
directories. Then do what you want with them; I recommend cataloging them
using a program like the Graphic Workshop, but you may find it more useful to
do something else with them.
B. Texture conversion chart (from DM2CONV source code)
When you use Doom textures for your level, as you'll probably do unless you
opt to use the list of Heretic textures above, it's pretty obvious that they
need to be converted. It's also pretty obvious (I told you above) that
DM2CONV with the /TEXTURE parameter is just the program that does it. But
this brings up a question; if you use Doom textures, how are you to know what
DM2CONV will replace them with when it converts them to Heretic. It would be
nice if there was some kind of chart; well, there is, thanks to the DM2CONV
source code included with the software.
Helpful hint: This isn't really an insider secret or anything, just common
sense. A helpful approach in any problem is to try and work backwards. After
seeing what the Heretic textures look like, you may have some textures already
picked out for your Heretic level; but since most of us can't put them in
directly, it's best to put in the Doom name that corresponds to the Heretic
wall. This way, when DM2CONV encounters the texture, it will be converted to
its Heretic equivalent; exactly the effect you wanted.
Most Doom level designers (based on the PWAD's I've seen) use DEU v5.21 or a
variant (like DDT, DeeP, etc.), and none of these (to the best of my
knowledge) let you insert a texture not found in the IWAD. The solution to
this (like letting you call a texture a Heretic name or a Doom I name if you
have Doom ][) is to change the default textures, which all the DEU variants
are pretty much forced to accept. Most of the time the textures are found in
the INI file of editor (DEU.INI, DDT.INI, etc.), which are in standard text
form, but in some cases (like HeeP and DeeP), this information is stored in a
different format, which has the extension CFG. If it's an INI file, you can
pretty much just invoke the DOS editor (if you have DOS 5 or above) and change
the default texture names to either a Doom name or a Heretic name (see
Appendix A for a list of wall textures). With a CFG file it's pretty much the
same procedure, except for the fact that you can't use a standard DOS/ASCII
editor. My tool of choice is DISKEDIT, which comes with the Norton Utilities.
I locate the appropriate texture name and overwrite it with the texture name
that I want it to be from Doom or Heretic. Usually, I change the default
texture name to something with the same amount of letters beforehand; just to
be sure I don't mess up the spacing when inserting characters.
C. WAD directory/Miscellaneous information
The PWAD directory structure for Heretic is also listed in the last GamePlay
Magazine. While most of the Heretic textures match up 1:1 with Doom textures,
some of them, like TMBSTON1 and CHAINMAN, are impossible to get without
putting them in manually. For example, when I created a tombstone in my
level, I could use one of the STEP? textures to get TMBSTON2 all over it, but
then the tombstone lacked any writing. So I used the nice little procedure
described in Appendix B; I edited the DEEP.CFG file with DISKEDIT and
proceeded to change the default lower texture to TMBSTON1. After that, I
cleared the previous lower texture, so the editor noticed that mine was
absent. I ran the level through the missing texture check, and sure enough,
the program put in TMBSTON1 for the missing texture, just as I had planned.
Of course, there's an alternative to having to insert the textures manually.
If you have DEU2C by the Un-Naturals (ADMiRAL and SONiC), or the Doom
Developers Toolkit, you can perform a nifty little trick, which will let you
insert wall textures (but not floor/ceiling textures) into your Heretic PWAD
quickly and easily. First of all, you'll need a copy of DM2CONV v1.6, which
comes with a nifty little tool called DMT. What DMT can do is convert an IWAD
to a PWAD and back, and it's this ability that comes into play in this
discussion. For a moment, I'll assume you're using the Doom Developers
Toolkit. Here's the trick:
You'll want both your editor, DDT, and DMT to be in the same sub-directory, so
you can make a batch file to change the main Heretic PWAD to an IWAD. In the
DDT.INI, you should have DOOM2.WAD as your main WAD file. Under that, change
the PWAD's you want to auto-load to include HERETIC1.WAD (being careful to
specify the correct path). Now you'll want to make a batch file using DMT to
convert the Heretic WAD to a PWAD, then running DDT, and then converting it
back when you're finished. I called my batch file HDDT.BAT. Here's how it
goes:
@ECHO OFF
DMT -OPEN D:\HERETIC\HERETIC1.WAD -IWAD D:\HERETIC\HERETIC1.WAD
DDT
DMT -OPEN D:\HERETIC\HERETIC1.WAD -IWAD D:\HERETIC\HERETIC1.WAD
After doing this (and changing the appropriate file paths), and running the
batch file, you should see a list of things DDT is "adding." After a few
years, when the list is finally complete, type R wadfile, where wadfile is the
name of your PWAD. For example, if I wanted to load MINE.WAD, I would type R
MINE.WAD. Then type E 1 to edit the first level, and you'll notice that the
palette is all screwed up. Disregard that for a second, and enter linedef
mode. Select a line, try changing the textures, and you'll realize that the
texture list is now that of Heretic, not Doom/Doom ][. You can simply select
textures for each of your linedefs by using this method. You'll notice that
this technique doesn't work with floors and ceilings (sigh).
There are a few textures which you'll probably want to put in either manually,
or using the technique described above, since no Doom textures will be
remapped to them when run through DM2CONV. Besides the forementioned CHAINMAN
(a 256x128 texture with a man in it), you'll also notice that DMNMSK (a gray
door with symbols) is also absent, along with STNGLS1 (a nice, multi-colored,
stained glass window). This list is not exhaustive; I'm sure there are many
more that can be found simply by comparing the lists in Appendices A and B.
General use tips (for beginners):
#1. Remember that on the sides of your door sectors, the two non-door lines
(the "door jamb" lines) should carry the IM (impassible) and Lower unpegged
flags. What this does is to ensure that the lines don't move when the door
does. A better summary can be found by downloading Scott Amspoker's terriffic
work on managing textures and the unpegged attribute.
#2. Extract the wall and floor/ceiling textures using DeuTex as described in
Appendix A. Then catalog them and use the resulting files to make sure that
the textures you use go together. Also useful for making sure textures go
together is the other miscellaneous information in Appendix A; usually, if
textures use about the same patches, they'll go pretty well together.
#3. Use the original Heretic as a model, for deciding what textures look good
where. There are some pretty neat textures, and combinations, present in the
levels, and using them as guidelines can help give your level a boost.
#4. Don't be afraid to download some tutorials for beginners, especially if
they deal with your particular editor (or a variant). I'm not afraid to admit
that I downloaded a couple when I was creating my first PWAD, and they can
contain some useful information that you otherwise might not know. I
recommend the Beginner's Guide to DEU and the Doom Level Design FAQ, version
1.2 or later.
One last tip: If you plan out your levels on paper, and I'm sure at least a
few of you do, you'd be well off using HeeP version 6.13 by Sensor Based
Systems. After it detects you have the shareware version, it won't let you
save, but since it contains all the Heretic shareware version
textures/linedefs/etc. (as well as a rather intuitive texture viewer), you
will be able to get a good idea of what the finished product will look like.
Just copy down what textures (as well as things, linedef types, etc.) look
good where on a piece of scrap paper (or your plan sheet) and input them later
with your regular Doom-based editor.
Yeah, and just a reminder: ID has not authorized, in fact, rather the
opposite, any distribution of levels compatible with the shareware versions
of their games! This is intended only for use while waiting for your
registered version to arrive. And then, once your registered version does
arrive, you can port your levels over to an editor that works with the
registered version of Heretic. If you would like to work fully with Heretic
levels (and use all the new things/textures), you need to register your
version.
Editor's Note: Thanks again to Paul Pollack for another great article. Look
for more from Paul in future issues of the Pasco BBS Magazine. Paul is an
avid gamer and frequent BBSer who, if you would like to contact him, can be
reached at Gator's Place BBS (813) 376-0087, or Dr. Duck's BBS (813) 849-3562.
You may also wish to visit his home page on the World Wide Web at
http://www.intol.com/paul/paul.htm.
+ + + + +
Case Against the CDA Provides a History of the Internet
-------------------------------------------------------
On June 11, 1996, the results of a three member judicial panel review of a
civil action filed against the government and the Communications Decency Act
were released. The case was heard in the United States District Court for the
Eastern District of Pennsylvania before judges Dolores K. Sloviter, Ronald L.
Buckwalter and Stewart Dalzell. The court papers summarized the case:
"Before us are motions for a preliminary injunction filed by plaintiffs who
challenge on constitutional grounds provisions of the Communications Decency
Act of 1996, which constitutes Title V of the Telecommunications Act of 1996,
signed into law by the President on February 8, 1996. Plaintiffs include
various organizations and individuals who, inter alia, are associated with the
computer and/or communications industries, or who publish or post materials on
the Internet, or belong to various citizen groups."
"The defendants in these actions are Janet Reno, the Attorney General of the
United States, and the United States Department of Justice. Plaintiffs
contend that the two challenged provisions of the CDA that are directed to
communications over the Internet which might be deemed "indecent" or "patently
offensive" for minors, defined as persons under the age of eighteen, infringe
upon rights protected by the First Amendment and the Due Process Clause of the
Fifth Amendment."
The primary defendants, among numerous others, were the American Civil
Liberties Union and the American Libraries Association, Inc. The court ruled
that the government could not control the Internet and that access was better
left in the hands of parents rather than the government. The plaintiffs were
expected to appeal.
The court order read in part: "And now, this 11th day of June, 1996, upon
consideration of plaintiffs' motions for preliminary injunction, and the
memoranda of the parties and amici curiae in support and opposition thereto,
and after hearing, and upon the findings of fact and conclusions of law set
forth in the accompanying Adjudication, it is hereby ORDERED that: 1. The
motions are GRANTED; 2. Defendant Attorney General Janet Reno, and all acting
under her direction and control, are PRELIMINARILY ENJOINED from enforcing,
prosecuting, investigating or reviewing any matter premised upon: (a)
Sections 223(a)(1)(B) and 223(a)(2) of the Communications Decency Act of 1996
("the CDA"), to the extent such enforcement, prosecution, investigation, or
review are based upon allegations other than obscenity or child pornography;
and (b) Sections 223(d)(1) and 223(d)(2) of the CDA; 3. Pursuant to Fed. R.
Civ. P. 65(c), plaintiffs need not post a bond for this injunction; and 4. The
parties shall advise the Court, in writing, as to their views regarding the
need for further proceedings on the later of (a) thirty days from the date of
this Order, or (b) ten days after final appellate review of this Order."
Before the above order was issued, the judges were given background and
historical information about the Internet. The rest of this article is an
extraction from the court papers explaining the Internet.
1. The Internet is not a physical or tangible entity, but rather a giant
network which interconnects innumerable smaller groups of linked computer
networks. It is thus a network of networks. This is best understood if one
considers what a linked group of computers -- referred to here as a "network"
-- is, and what it does. Small networks are now ubiquitous (and are often
called "local area networks"). For example, in many United States
Courthouses, computers are linked to each other for the purpose of exchanging
files and messages (and to share equipment such as printers). These are
networks.
2. Some networks are "closed" networks, not linked to other computers or
networks. Many networks, however, are connected to other networks, which are
in turn connected to other networks in a manner which permits each computer in
any network to communicate with computers on any other network in the system.
This global Web of linked networks and computers is referred to as the
Internet.
3. The nature of the Internet is such that it is very difficult, if not
impossible, to determine its size at a given moment. It is indisputable,
however, that the Internet has experienced extraordinary growth in recent
years. In 1981, fewer than 300 computers were linked to the Internet, and by
1989, the number stood at fewer than 90,000 computers. By 1993, over
1,000,000 computers were linked. Today, over 9,400,000 host computers
worldwide, of which approximately 60 percent located within the United States,
are estimated to be linked to the Internet. This count does not include the
personal computers people use to access the Internet using modems. In all,
reasonable estimates are that as many as 40 million people around the world
can and do access the enormously flexible communication Internet medium. That
figure is expected to grow to 200 million Internet users by the year 1999.
4. Some of the computers and computer networks that make up the Internet are
owned by governmental and public institutions, some are owned by non-profit
organizations, and some are privately owned. The resulting whole is a
decentralized, global medium of communications -- or "cyberspace" -- that
links people, institutions, corporations, and governments around the world.
The Internet is an international system. This communications medium allows
any of the literally tens of millions of people with access to the Internet to
exchange information. These communications can occur almost instantaneously,
and can be directed either to specific individuals, to a broader group of
people interested in a particular subject, or to the world as a whole.
5. The Internet had its origins in 1969 as an experimental project of the
Advanced Research Project Agency ("ARPA"), and was called ARPANET. This
network linked computers and computer networks owned by the military, defense
contractors, and university laboratories conducting defense-related research.
The network later allowed researchers across the country to access directly
and to use extremely powerful supercomputers located at a few key universities
and laboratories. As it evolved far beyond its research origins in the United
States to encompass universities, corporations, and people around the world,
the ARPANET came to be called the "DARPA Internet," and finally just the
"Internet."
6. From its inception, the network was designed to be a decentralized, self-
maintaining series of redundant links between computers and computer networks,
capable of rapidly transmitting communications without direct human
involvement or control, and with the automatic ability to re-route
communications if one or more individual links were damaged or otherwise
unavailable. Among other goals, this redundant system of linked computers was
designed to allow vital research and communications to continue even if
portions of the network were damaged, say, in a war.
7. To achieve this resilient nationwide (and ultimately global)
communications medium, the ARPANET encouraged the creation of multiple links
to and from each computer (or computer network) on the network. Thus, a
computer located in Washington, D.C., might be linked (usually using dedicated
telephone lines) to other computers in neighboring states or on the Eastern
seaboard. Each of those computers could in turn be linked to other computers,
which themselves would be linked to other computers.
8. A communication sent over this redundant series of linked computers could
travel any of a number of routes to its destination. Thus, a message sent
from a computer in Washington, D.C., to a computer in Palo Alto, California,
might first be sent to a computer in Philadelphia, and then be forwarded to a
computer in Pittsburgh, and then to Chicago, Denver, and Salt Lake City,
before finally reaching Palo Alto. If the message could not travel along that
path (because of military attack, simple technical malfunction, or other
reason), the message would automatically (without human intervention or even
knowledge) be re-routed, perhaps, from Washington, D.C. to Richmond, and then
to Atlanta, New Orleans, Dallas, Albuquerque, Los Angeles, and finally to Palo
Alto. This type of transmission, and re-routing, would likely occur in a
matter of seconds.
9. Messages between computers on the Internet do not necessarily travel
entirely along the same path. The Internet uses "packet switching"
communication protocols that allow individual messages to be subdivided into
smaller "packets" that are then sent independently to the destination, and are
then automatically reassembled by the receiving computer. While all packets
of a given message often travel along the same path to the destination, if
computers along the route become overloaded, then packets can be re-routed to
less loaded computers.
10. At the same time that ARPANET was maturing (it subsequently ceased to
exist), similar networks developed to link universities, research facilities,
businesses, and individuals around the world. These other formal or loose
networks included BITNET, CSNET, FIDONET, and USENET. Eventually, each of
these networks (many of which overlapped) were themselves linked together,
allowing users of any computers linked to any one of the networks to transmit
communications to users of computers on other networks. It is this series of
linked networks (themselves linking computers and computer networks) that is
today commonly known as the Internet.
11. No single entity -- academic, corporate, governmental, or non-profit --
administers the Internet. It exists and functions as a result of the fact
that hundreds of thousands of separate operators of computers and computer
networks independently decided to use common data transfer protocols to
exchange communications and information with other computers (which in turn
exchange communications and information with still other computers). There is
no centralized storage location, control point, or communications channel for
the Internet, and it would not be technically feasible for a single entity to
control all of the information conveyed on the Internet.
12. Individuals have a wide variety of avenues to access cyberspace in
general, and the Internet in particular. In terms of physical access, there
are two common methods to establish an actual link to the Internet. First,
one can use a computer or computer terminal that is directly (and usually
permanently) connected to a computer network that is itself directly or
indirectly connected to the Internet. Second, one can use a "personal
computer" with a "modem" to connect over a telephone line to a larger computer
or computer network that is itself directly or indirectly connected to the
Internet. As detailed below, both direct and modem connections are made
available to people by a wide variety of academic, governmental, or commercial
entities.
13. Students, faculty, researchers, and others affiliated with the vast
majority of colleges and universities in the United States can access the
Internet through their educational institutions. Such access is often via
direct connection using computers located in campus libraries, offices, or
computer centers, or may be through telephone access using a modem from a
student's or professor's campus or off-campus location. Some colleges and
universities install "ports" or outlets for direct network connections in each
dormitory room or provide access via computers located in common areas in
dormitories. Such access enables students and professors to use information
and content provided by the college or university itself, and to use the vast
amount of research resources and other information available on the Internet
worldwide.
14. Similarly, Internet resources and access are sufficiently important to
many corporations and other employers that those employers link their office
computer networks to the Internet and provide employees with direct or modem
access to the office network (and thus to the Internet). Such access might be
used by, for example, a corporation involved in scientific or medical research
or manufacturing to enable corporate employees to exchange information and
ideas with academic researchers in their fields.
15. Those who lack access to the Internet through their schools or employers
still have a variety of ways they can access the Internet. Many communities
across the country have established "free-nets" or community networks to
provide their citizens with a local link to the Internet (and to provide
local-oriented content and discussion groups). The first such community
network, the Cleveland Free-Net Community Computer System, was established in
1986, and free-nets now exist in scores of communities as diverse as Richmond,
Virginia, Tallahassee, Florida, Seattle, Washington, and San Diego,
California. Individuals typically can access free-nets at little or no cost
via modem connection or by using computers available in community buildings.
Free-nets are often operated by a local library, educational institution, or
non-profit community group.
16. Individuals can also access the Internet through many local libraries.
Libraries often offer patrons use of computers that are linked to the
Internet. In addition, some libraries offer telephone modem access to the
libraries' computers, which are themselves connected to the Internet.
Increasingly, patrons now use library services and resources without ever
physically entering the library itself. Libraries typically provide such
direct or modem access at no cost to the individual user.
17. Individuals can also access the Internet by patronizing an increasing
number of storefront "computer coffee shops," where customers -- while they
drink their coffee -- can use computers provided by the shop to access the
Internet. Such Internet access is typically provided by the shop for a small
hourly fee.
18. Individuals can also access the Internet through commercial and non-
commercial "Internet service providers" that typically offer modem telephone
access to a computer or computer network linked to the Internet. Many such
providers -- including the members of plaintiff Commercial Internet Exchange
Association -- are commercial entities offering Internet access for a monthly
or hourly fee. Some Internet service providers, however, are non-profit
organizations that offer free or very low cost access to the Internet. For
example, the International Internet Association offers free modem access to
the Internet upon request. Also, a number of trade or other non-profit
associations offer Internet access as a service to members.
19. Another common way for individuals to access the Internet is through one
of the major national commercial "online services" such as America Online,
CompuServe, the Microsoft Network, or Prodigy. These online services offer
nationwide computer networks (so that subscribers can dial-in to a local
telephone number), and the services provide extensive and well organized
content within their own proprietary computer networks. In addition to
allowing access to the extensive content available within each online service,
the services also allow subscribers to link to the much larger resources of
the Internet. Full access to the online service (including access to the
Internet) can be obtained for modest monthly or hourly fees. The major
commercial online services have almost twelve million individual subscribers
across the United States.
20. In addition to using the national commercial online services, individuals
can also access the Internet using some (but not all) of the thousands of
local dial-in computer services, often called "bulletin board systems" or
"BBSs." With an investment of as little as $2,000.00 and the cost of a
telephone line, individuals, non-profit organizations, advocacy groups, and
businesses can offer their own dial-in computer "bulletin board" service where
friends, members, subscribers, or customers can exchange ideas and
information. BBSs range from single computers with only one telephone line
into the computer (allowing only one user at a time), to single computers with
many telephone lines into the computer (allowing multiple simultaneous users),
to multiple linked computers each servicing multiple dial-in telephone lines
(allowing multiple simultaneous users). Some (but not all) of these BBS
systems offer direct or indirect links to the Internet. Some BBS systems
charge users a nominal fee for access, while many others are free to the
individual users.
21. Although commercial access to the Internet is growing rapidly, many users
of the Internet -- such as college students and staff -- do not individually
pay for access (except to the extent, for example, that the cost of computer
services is a component of college tuition). These and other Internet users
can access the Internet without paying for such access with a credit card or
other form of payment.
22. Once one has access to the Internet, there are a wide variety of
different methods of communication and information exchange over the network.
These many methods of communication and information retrieval are constantly
evolving and are therefore difficult to categorize concisely. The most common
methods of communications on the Internet (as well as within the major online
services) can be roughly grouped into six categories: (1) one-to-one
messaging (such as "e-mail"), (2) one-to-many messaging (such as "listserv"),
(3) distributed message databases (such as "USENET newsgroups"), (4) real time
communication (such as "Internet Relay Chat"), (5) real time remote computer
utilization (such as "telnet"), and (6) remote information retrieval (such as
"ftp," "gopher," and the "World Wide Web"). Most of these methods of
communication can be used to transmit text, data, computer programs, sound,
visual images (i.e., pictures), and moving video images.
23. One-to-one messaging. One method of communication on the Internet is via
electronic mail, or "e-mail," comparable in principle to sending a first class
letter. One can address and transmit a message to one or more other people.
E-mail on the Internet is not routed through a central control point, and can
take many and varying paths to the recipients. Unlike postal mail, simple e-
mail generally is not "sealed" or secure, and can be accessed or viewed on
intermediate computers between the sender and recipient (unless the message is
encrypted).
24. One-to-many messaging. The Internet also contains automatic mailing list
services (such as "listservs"), [also referred to by witnesses as "mail
exploders"] that allow communications about particular subjects of interest to
a group of people. For example, people can subscribe to a "listserv" mailing
list on a particular topic of interest to them. The subscriber can submit
messages on the topic to the listserv that are forwarded (via e-mail), either
automatically or through a human moderator overseeing the listserv, to anyone
who has subscribed to the mailing list. A recipient of such a message can
reply to the message and have the reply also distributed to everyone on the
mailing list. This service provides the capability to keep abreast of
developments or events in a particular subject area. Most listserv-type
mailing lists automatically forward all incoming messages to all mailing list
subscribers. There are thousands of such mailing list services on the
Internet, collectively with hundreds of thousands of subscribers. Users of
"open" listservs typically can add or remove their names from the mailing list
automatically, with no direct human involvement. Listservs may also be
"closed," i.e., only allowing for one's acceptance into the listserv by a
human moderator.
25. Distributed message databases. Similar in function to listservs -- but
quite different in how communications are transmitted -- are distributed
message databases such as "USENET newsgroups." User-sponsored newsgroups are
among the most popular and widespread applications of Internet services, and
cover all imaginable topics of interest to users. Like listservs, newsgroups
are open discussions and exchanges on particular topics. Users, however, need
not subscribe to the discussion mailing list in advance, but can instead
access the database at any time. Some USENET newsgroups are "moderated" but
most are open access. For the moderated newsgroups, all messages to the
newsgroup are forwarded to one person who can screen them for relevance to the
topics under discussion. USENET newsgroups are disseminated using ad hoc,
peer to peer connections between approximately 200,000 computers (called
USENET "servers") around the world. For unmoderated newsgroups, when an
individual user with access to a USENET server posts a message to a newsgroup,
the message is automatically forwarded to all adjacent USENET servers that
furnish access to the newsgroup, and it is then propagated to the servers
adjacent to those servers, etc. The messages are temporarily stored on each
receiving server, where they are available for review and response by
individual users. The messages are automatically and periodically purged from
each system after a time to make room for new messages. Responses to
messages, like the original messages, are automatically distributed to all
other computers receiving the newsgroup or forwarded to a moderator in the
case of a moderated newsgroup. The dissemination of messages to USENET
servers around the world is an automated process that does not require direct
human intervention or review.
26. There are newsgroups on more than fifteen thousand different subjects.
In 1994, approximately 70,000 messages were posted to newsgroups each day, and
those messages were distributed to the approximately 190,000 computers or
computer networks that participate in the USENET newsgroup system. Once the
messages reach the approximately 190,000 receiving computers or computer
networks, they are available to individual users of those computers or
computer networks. Collectively, almost 100,000 new messages (or "articles")
are posted to newsgroups each day.
27. Real time communication. In addition to transmitting messages that can
be later read or accessed, individuals on the Internet can engage in an
immediate dialog, in "real time", with other people on the Internet. In its
simplest forms, "talk" allows one-to-one communications and "Internet Relay
Chat" (or IRC) allows two or more to type messages to each other that almost
immediately appear on the others' computer screens. IRC is analogous to a
telephone party line, using a computer and keyboard rather than a telephone.
With IRC, however, at any one time there are thousands of different party
lines available, in which collectively tens of thousands of users are engaging
in conversations on a huge range of subjects. Moreover, one can create a new
party line to discuss a different topic at any time. Some IRC conversations
are "moderated" or include "channel operators."
28. In addition, commercial online services such as America Online,
CompuServe, the Microsoft Network, and Prodigy have their own "chat" systems
allowing their members to converse.
29. Real time remote computer utilization. Another method to use information
on the Internet is to access and control remote computers in "real time" using
"telnet." For example, using telnet, a researcher at a university would be
able to use the computing power of a supercomputer located at a different
university. A student can use telnet to connect to a remote library to access
the library's online card catalog program.
30. Remote information retrieval. The final major category of communication
may be the most well known use of the Internet -- the search for and retrieval
of information located on remote computers. There are three primary methods
to locate and retrieve information on the Internet.
31. A simple method uses "ftp" (or file transfer protocol) to list the names
of computer files available on a remote computer, and to transfer one or more
of those files to an individual's local computer.
32. Another approach uses a program and format named "gopher" to guide an
individual's search through the resources available on a remote computer.
33. A third approach, and fast becoming the most well-known on the Internet,
is the "World Wide Web." The Web utilizes a "hypertext" formatting language
called hypertext markup language (HTML), and programs that "browse" the Web
can display HTML documents containing text, images, sound, animation and
moving video. Any HTML document can include links to other types of
information or resources, so that while viewing an HTML document that, for
example, describes resources available on the Internet, one can "click" using
a computer mouse on the description of the resource and be immediately
connected to the resource itself. Such "hyperlinks" allow information to be
accessed and organized in very flexible ways, and allow people to locate and
efficiently view related information even if the information is stored on
numerous computers all around the world.
34. Purpose. The World Wide Web (W3C) was created to serve as the platform
for a global, online store of knowledge, containing information from a
diversity of sources and accessible to Internet users around the world.
Though information on the Web is contained in individual computers, the fact
that each of these computers is connected to the Internet through W3C
protocols allows all of the information to become part of a single body of
knowledge. It is currently the most advanced information system developed on
the Internet, and embraces within its data model most information in previous
networked information systems such as ftp, gopher, wais, and Usenet.
35. History. W3C was originally developed at CERN, the European Particle
Physics Laboratory, and was initially used to allow information sharing within
internationally dispersed teams of researchers and engineers. Originally
aimed at the High Energy Physics community, it has spread to other areas and
attracted much interest in user support, resource recovery, and many other
areas which depend on collaborative and information sharing. The Web has
extended beyond the scientific and academic community to include
communications by individuals, non-profit organizations, and businesses.
36. Basic Operation. The World Wide Web is a series of documents stored in
different computers all over the Internet. Documents contain information
stored in a variety of formats, including text, still images, sounds, and
video. An essential element of the Web is that any document has an address
(rather like a telephone number). Most Web documents contain "links." These
are short sections of text or image which refer to another document.
Typically the linked text is blue or underlined when displayed, and when
selected by the user, the referenced document is automatically displayed,
wherever in the world it actually is stored. Links for example are used to
lead from overview documents to more detailed documents, from tables of
contents to particular pages, but also as cross-references, footnotes, and
new forms of information structure.
37. Many organizations now have "home pages" on the Web. These are documents
which provide a set of links designed to represent the organization, and
through links from the home page, guide the user directly or indirectly to
information about or relevant to that organization.
38. As an example of the use of links, if these Findings were to be put on a
World Wide Web site, its home page might contain links such as those:
*THE NATURE OF CYBERSPACE
*CREATION OF THE INTERNET AND THE DEVELOPMENT OF CYBERSPACE
*HOW PEOPLE ACCESS THE INTERNET
*METHODS TO COMMUNICATE OVER THE INTERNET
39. Each of these links takes the user of the site from the beginning of the
Findings to the appropriate section within this Adjudication. Links may also
take the user from the original Web site to another Web site on another
computer connected to the Internet. These links from one computer to another,
from one document to another across the Internet, are what unify the Web into
a single body of knowledge, and what makes the Web unique. The Web was
designed with a maximum target time to follow a link of one tenth of a second.
40. Publishing. The World Wide Web exists fundamentally as a platform
through which people and organizations can communicate through shared
information. When information is made available, it is said to be "published"
on the Web. Publishing on the Web simply requires that the "publisher" has a
computer connected to the Internet and that the computer is running W3C server
software. The computer can be as simple as a small personal computer costing
less than $1500 dollars or as complex as a multi-million dollar mainframe
computer. Many Web publishers choose instead to lease disk storage space from
someone else who has the necessary computer facilities, eliminating the need
for actually owning any equipment oneself.
41. The Web, as a universe of network accessible information, contains a
variety of documents prepared with quite varying degrees of care, from the
hastily typed idea, to the professionally executed corporate profile. The
power of the Web stems from the ability of a link to point to any document,
regardless of its status or physical location.
42. Information to be published on the Web must also be formatted according
to the rules of the Web standards. These standardized formats assure that all
Web users who want to read the material will be able to view it. Web
standards are sophisticated and flexible enough that they have grown to meet
the publishing needs of many large corporations, banks, brokerage houses,
newspapers and magazines which now publish "online" editions of their
material, as well as government agencies, and even courts, which use the Web
to disseminate information to the public. At the same time, Web publishing is
simple enough that thousands of individual users and small community
organizations are using the Web to publish their own personal "home pages,"
the equivalent of individualized newsletters about that person or
organization, which are available to everyone on the Web.
43. Web publishers have a choice to make their Web sites open to the general
pool of all Internet users, or close them, thus making the information
accessible only to those with advance authorization. Many publishers choose
to keep their sites open to all in order to give their information the widest
potential audience. In the event that the publishers choose to maintain
restrictions on access, this may be accomplished by assigning specific user
names and passwords as a prerequisite to access to the site. Or, in the case
of Web sites maintained for internal use of one organization, access will only
be allowed from other computers within that organization's local network.
44. Searching the Web. A variety of systems have developed that allow users
of the Web to search particular information among all of the public sites that
are part of the Web. Services such as Yahoo, Magellan, Altavista, Webcrawler,
and Lycos are all services known as "search engines" which allow users to
search for Web sites that contain certain categories of information, or to
search for key words. For example, a Web user looking for the text of Supreme
Court opinions would type the words "Supreme Court" into a search engine, and
then be presented with a list of World Wide Web sites that contain Supreme
Court information. This list would actually be a series of links to those
sites. Having searched out a number of sites that might contain the desired
information, the user would then follow individual links, browsing through the
information on each site, until the desired material is found. For many
content providers on the Web, the ability to be found by these search engines
is very important.
45. Common standards. The Web links together disparate information on an
ever-growing number of Internet-linked computers by setting common information
storage formats (HTML) and a common language for the exchange of Web documents
(HTTP). Although the information itself may be in many different formats, and
stored on computers which are not otherwise compatible, the basic Web
standards provide a basic set of standards which allow communication and
exchange of information. Despite the fact that many types of computers are
used on the Web, and the fact that many of these machines are otherwise
incompatible, those who "publish" information on the Web are able to
communicate with those who seek to access information with little difficulty
because of these basic technical standards.
46. A distributed system with no centralized control. Running on tens of
thousands of individual computers on the Internet, the Web is what is known as
a distributed system. The Web was designed so that organizations with
computers containing information can become part of the Web simply by
attaching their computers to the Internet and running appropriate World Wide
Web software. No single organization controls any membership in the Web, nor
is there any single centralized point from which individual Web sites or
services can be blocked from the Web. From a user's perspective, it may
appear to be a single, integrated system, but in reality it has no centralized
control point.
47. Contrast to closed databases. The Web's open, distributed, decentralized
nature stands in sharp contrast to most information systems that have come
before it. Private information services such as Westlaw, Lexis/Nexis, and
Dialog, have contained large storehouses of knowledge, and can be accessed
from the Internet with the appropriate passwords and access software.
However, these databases are not linked together into a single whole, as is
the World Wide Web.
48. Success of the Web in research, education, and political activities. The
World Wide Web has become so popular because of its open, distributed, and
easy-to-use nature. Rather than requiring those who seek information to
purchase new software or hardware, and to learn a new kind of system for each
new database of information they seek to access, the Web environment makes it
easy for users to jump from one set of information to another. By the same
token, the open nature of the Web makes it easy for publishers to reach their
intended audiences without having to know in advance what kind of computer
each potential reader has, and what kind of software they will be using.
Editor's Note: The court papers for this case generated quite a bit of
interesting reading and it is possible that additional extractions will appear
in future issues.
+ + + + +
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
² ²
² Board of Trade BBS New Port Richey, Florida ²
² ²
² (813) 862-4772 12/24/48/96/144/28800 baud ²
² ²
² The Hobby BBS for the Entire Family! ²
² ²
² Pasco County's Information Source ²
² Home of the Pasco BBS Magazine, DA BUCS and BBS Basics ²
² ²
² Call here FIRST for the BEST in Shareware ²
² Official Distribution Site: ²
² Alive Software, Apogee Software, Epic MegaGames, Gamer's Edge, ²
² Id Software, Impulse Software, MVP Software, Safari Software, ²
² Software Creations, Soleau Software and Union Logic Software ²
² ²
² Supporting the Local Computer Community ²
² Local Author Support File Directory ²
² Official Support BBS for Pasco ComPats Computer Club ²
² ²
°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°°
+ + + + +
Next Month
----------
Traditionally, the August issue has previewed the ONE BBSCON. With the death
of the BBSCON, we will run an article about its legacy. There will be a
preview of the first ONE ISPCON, but we will have far less coverage of the
show compared to last year when Tampa hosted the last ONE BBSCON. Look for
all our regular features, along with the latest news.
The August issue of the Pasco BBS Magazine will be available on, or before,
July 22. Make sure you do not miss a single issue of Tampa Bay's oldest free
on-line magazine!
+ + + + +
Important Information
---------------------
The Pasco BBS Magazine is distributed free of charge, as long as it is
unaltered and complete. When uploading make sure the original archive is
intact with all files included.
The Pasco BBS Magazine is the sole property of the Board of Trade BBS and
Richard Ziegler. It is legally copyrighted material and all rights are
reserved. No part of this magazine may be used without permission. No
compensation of any kind may be received for the viewing, distribution, or for
any other use of the magazine files.
By submitting something, you are agreeing to allow publication of the material
in the magazine. Articles reprinted with permission remain the property of
the cited source. Guest contributions may not necessarily reflect the views
of the Pasco BBS Magazine. The editor reserves the right to edit submissions,
however, this is normally only done to correct spelling or grammatical errors.
The editor makes all determinations on what and when articles will run.
Every effort is made to insure that all information contained within the Pasco
BBS Magazine is accurate, but inadvertently mistakes can appear.
The Pasco BBS Magazine, Board of Trade BBS or Richard Ziegler cannot be held
liable for information contained within this document. It is intended that
this magazine exists for the personal enjoyment of the readers.
Rather than place a trademark symbol at every occurrence of a trademarked
name, it is stated that trademarks are only being used in an editorial fashion
with no intention of any infringement of the trademark itself.
More information can be found in the other files distributed with the
magazine's archive.
Comments, questions, suggestions and submissions can be left on the Board
of Trade BBS (813) 862-4772, or mailed to Board of Trade BBS, P.O. Box 1853,
New Port Richey, FL 34656.
+ + + + +
(C)Copyright 1996 Richard Ziegler - All Rights Reserved
+ + + + +