textfiles/bbs/FIDONET/FIDONEWS/fido0316.nws

1080 lines
50 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 3, Number 16 21 April 1986
+---------------------------------------------------------------+
| _ |
| / \ |
| - FidoNews - /|oo \ |
| (_| /_) |
| Fido and FidoNet _`@/_ \ _ |
| Users Group | | \ \\ |
| Newsletter | (*) | \ )) |
| ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (C) Copyright 1986 by IFNA (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief: Thom Henderson
Chief Procrastinator Emeritus: Tom Jennings
FidoNews is the official newsletter of the International FidoNet
Association, and is published weekly by SEAdog Leader, node 1/1.
You are encouraged to submit articles for publication in
FidoNews. Article submission standards are contained in the file
FNEWSART.DOC, available from node 1/1.
The contents of the articles contained here are not our
responsibility, nor do we necessarily agree with them.
Everything here is subject to debate.
Table of Contents
1. EDITORIAL
Spaghetti Coding
2. ARTICLES
Information needed on Fidonet compatible clones
Automated File Relays
Fido lives on a Zenith Z-100
3. COLUMNS
Notes from Abroad
The World of Computing: Copy protection and book reviews
PC Week reviews ARC
4. WANTED
Texarkana Regional Coordinator
5. FOR SALE
Entertainment Software for your PC!
Public Domain Software Library Sale!!
Special Offer to FidoNet Sysops
6. NOTICES
The Interrupt Stack
FidoNet does NOT observe Daylight Savings Time
Fidonews Page 2 21 Apr 1986
=================================================================
EDITORIAL
=================================================================
Jim Butterfield
Spaghetti Coding
I recently received a letter from Syd Bolton, who was
most enthusiastic about "free-form" programming. You know the
sort of thing -- the first step is to turn the computer on. The
next is to write a dozen lines or so; after that, decide what you
want to do. Under no circumstances is any planning to take place
before switching on, and work with pencil and paper is
unthinkable.
I'm overstating the case, of course. The point is -- and
several writers have pointed this out lyrically -- it's great fun
to horse around with code and see how (or if) you can get things
to come out. I've even been quoted myself as saying that one of
the marks of a virtuoso programmer is the ability to convince
people that the program you ended up with was really what you
intended to do in the first place, more or less. To put it
poetically, it's a heck of a hacker who can hook the hawks of
hoke code for hicks.
Fooling around can be a lot of fun, whether you do it in
school, at the beach, or while programming. If your object is to
have a good time, go ahead, with my blessing. If your object is
to have a good program, well...
It's a lot of fun to eat a good meal: it's not so much
fun to plan and prepare it beforehand, or to wash the dishes
afterward. I suspect it's the same thing with programs. It's
more fun to dive in and chop at the code: it's much less fun to
plan before and document afterward. When I look at some
programs, I sometimes wish that the programmer had worn a bib
when writing it. I can see the litter of leftover and patched-up
code in there.
If you are writing a one-shot program for your own use,
go to it. If it slugs away for two minutes and then reports
?SYNTAX ERROR IN LINE 5870, chop in a repair and run it again.
And if the repair doesn't work, try another chop. If THAT
doesn't work, sit down and think. Sound familiar? That's what
you get when you hack at a program, and it can be lots of fun.
But be aware that free flight coding does have its
problems. Such as: (i) you drag the program out six weeks later
and can't read it yourself; (ii) you make a small change and the
whole thing collapses for no apparent reason; (iii) you give away
or sell copies, and people phone you telling you things that
don't work properly; (iv) your program wins a prize in "worst
code of the year"; (v) somebody sends you a "cleaned up" rewrite
of your program that uses one-third of the lines; (vi) you wrote
it for ten provinces, and it turns out that it cannot be
converted to fifty states without a total rewrite.
Fidonews Page 3 21 Apr 1986
It's okay to write green slime coding. But keep in mind
the following thoughts. If you want to publish or sell it,
you'll also want to do massive cleaning up. Also, well-shaped
coding gives you a good feeling; you feel proud of not just the
program, but also the coding it contains. Moreover, if you get
into trouble, you can scrap the old program and start over. When
you rewrite it you may have nothing written down, but you'll have
a plan: the organization of the program as you perceived it on
the previous write.
If you write "natcheral" code and enjoy it, and if your
programs work, good for you! It's hard to knock a working
program. But there's another factor: pride of workmanship.
Sometimes you just feel good about a program that you have
written. You may not know why, but you'd like to show the coding
to others because the parts fit together so neatly. When this
happens, it's usually a question of style. Often, you've solved
a specific program in a general way. For example, you might have
calculated the average value of five numbers, but you've done it
in such a way that a minor change would perform the same
calculation for a hundred values. You've gone from the specific
task to a general solution, and that makes you a more powerful
programmer.
You might have heard a lot of talk about "structured",
"goto-less", or "top-down" programming. These are essentially
concerned with planning, rather than programming as such
(although it's easy to be misled by the mechanics). Their
general objective is to encourage you (or shove you) into
creating a program that flows in an orderly way, rather than
hopping around. A program should be something like a railway
line, with main line, spurs, and sidings clearly identified; it
shouldn't be like a city map with no clear path from one point to
another. I see programs in which the programmer seems to have
arrived in a maze of twisting little passages, all the same.
You might think that you write only one line at a time,
but it's not so. If you write FOR J=1 TO 10 in a program, you're
engaged in planning ahead. You plan to repeat the next new
statement ten times, and you've committed yourself to eventually
writing a NEXT J. There's no such thing as truly barefoot
programming -- your mind is always thinking a few lines ahead,
and you're always planning. The real danger is to write IF X>10
GOTO 575 hoping that when you get to 575 you will have figured
out what to do when X is greater than 10.
But whether or not you admit to planning, whether or not
you do more of it or less of it, do continue to have fun with
your programming. And if you can break the rules and still come
up with a neat program that works well, more power to you.
Copyright (c) 1985 Jim Butterfield. Permission to reprint is
hereby granted, provided this notice is included in the reprinted
material.
-----------------------------------------------------------------
Fidonews Page 4 21 Apr 1986
=================================================================
ARTICLES
=================================================================
Bill Allbritten, 11/301
Information needed on Fidonet compatible clones
As a not too technically sophisticated user, I find that
documentation is a necessity to get anything done. It was good
to see Tom Jennings call for an udpdate on Fidonet protocols.
One other area that, if it has not already been updated, that
could stand some attention is compatibility between Fido and the
proliferation of clones, PC,XT, and AT, that have hit the market.
Ditto for all of the so-called Hayes compatible modem clones out
there. If you live in the boonies and do most of your purchasing
mail order, you need to hit things right the first time or suffer
a lot of inconvenience if not expense. Therefore, I would like
to update the documenation on compatible computers and modems.
If you are running FIDO on a machine NOT listed in the original
documentation and/or using a modem NOT described in the original
FIDO documentation, would you send the following information to
me at 11/301? I will then compile the list and send in to this
journal. Please set up your information as follows so I can read
it into my database. A carriage return and line feed should
appear between fields. I think this will help a lot of us
looking at the very inexpensive machines now on the market.
Specific machines being sought are the generic clones, the AT
clones, and any exotics such as the Apricot that folks have had
some luck with.
For computers, please send the following: (no commas in fields,
please)
BRAND NAME
DEALER NAME
DEALER ADDRESS (City State ZIP)
DEALER PHONE
RAM currently installed
ACCESSORY BOARDS (up to 65 characters)
ACCESSORY BOARDS (up to 65 characters)
TYPE of VIDEO card
MULTITASKING SOFTWARE (if appropriate)
COMMENTS
COMMENTS
COMMENTS
COMMENTS
COMMENTS (each comment line up to 65 characters
YOUR NAME
YOUR ADDRESS
YOUR PHONE (data or voice, please indicate--Last three items are
optional)
For modems, please send the following: (no commas in fields,
Fidonews Page 5 21 Apr 1986
please)
BRAND NAME
DEALER NAME
DEALER ADDRESS (City State Zip)
PROTOCOLS SUPPORTED
MODEM MASK SWITCH SETTING (16, 32, 64, 128, etc)
OTHER SWITCH SETTINGS ( 1U 2D; 1ON 2OFF as appropriate)
COMMENTS
COMMENTS
COMMENTS
COMMENTS
COMMENTS (each comment line up to 65 characters)
YOUR NAME
YOUR ADDRESS
YOUR PHONE (date or voice-please indicate--Last three items
optional)
You do not need to respond to all fields. Just enter a blank
line for any field not use. Thanks.
I look forward to hearing from you on 11/301. I will collect
this material until MAY 1, 1986, and then send it in. It will be
available sooner on my board in file area 4 as COMPAT.TXT.
-----------------------------------------------------------------
Fidonews Page 6 21 Apr 1986
Thom Henderson, 107/8
System Enhancement Associates
Automated File Relays
A common problem faced by FidoNet sysops is how to reliably
automate the relaying of files, particularly the node list and
newsletter. Our Robot program has assisted greatly in this task,
but problems sometime arise when file mailings are delayed.
In a typical case, a sysop will expect to receive the node list
on, say, Sunday morning, and will pass it on by placing entries
in the Robot control file like so:
Sun input\nodelist.a* 107/4
Sun input\nodelist.a* 107/5
Sun input\nodelist.a* 107/6
This works, but has a drawback. If the node list isn't received
when expected, then the relay messages are still sent. A
somewhat better approach makes use of the EXIST keyword, like so:
Sun exist input\nodelist.a* 107/4
Sun exist input\nodelist.a* 107/5
Sun exist input\nodelist.a* 107/6
This is a bit better because the relay messages won't be sent
unless there is a node list to be relayed. In most cases this
will work properly. But consider the case where the node list is
delayed a day, for whatever reason. Robot won't create the
messages because the node list wasn't there on Sunday.
A more reliable method involves two directories, and makes use of
Robot's "demand mode". Assuming two directories called INPUT and
OUTPUT, an external event can be set to run immediately after the
national mail hour, like so:
:relay
if not exist input\nodelist.a* goto nolist
del output\nodelist.a*
copy input\nodelist.a* output
del input\nodelist.a*
robot list
:nolist
if not exist input\fnews*.arc goto nonews
del output\fnews*.arc
copy input\fnews*.arc output
del input\fnews*.arc
robot news
:nonews
Fidonews Page 7 21 Apr 1986
The Robot control file to go with this would look something like
this:
list: output\nodelist.a* 107/3
list: output\nodelist.a* 107/4
list: output\nodelist.a* 107/5
news: output\fnews*.arc 107/3
news: output\fnews*.arc 107/4
news: output\fnews*.arc 107/5
The advantage to this approach is that the file relay messages
are triggered by the receipt of the file to be relayed. The
outgoing messages will be sent ONLY when a new file is received,
regardless of when that happens. If a node list is delayed a
day, or two, or four, it will still be properly sent.
Special note: In DOS 2.0 and 2.1 and IF EXIST cannot take a path.
If you do not have DOS 3.0 or 3.1, then it will be necessary to
change directories to test for the presence or absence of a file.
-----------------------------------------------------------------
Fidonews Page 8 21 Apr 1986
Joseph E Rock, Jr; 128/15
Z-Fido. Z-Fido? Z-Fido!
From what I have seen, most of the Fido BBS's are hosted on IBM
PCs or clones. I was not much of a BBS person until very
recently. When I went to the local Heath Users Group (HUG)
meeting the sysop of the local Fido Host (Richard Evers) was
there. During the discussion, he brought up the idea of getting
Fido to run on a Z-100. He said that the necessary software (an
interrupt handler) was not available for the Z-100. I thought:
"that can't be very difficult to write." And promptly volunteered
to produce the driver on my Z at home. Well, the warning that Tom
Jennings gives in the Generic.doc and Generic.asm files is true -
writing the driver is not a piece of cake. However, I did manage
to write and debug the software within one week. Now, my Z is
running as a FidoNode (128/15) except the times when I need to
use it for other things (like writing articles or trying to chase
the bugs out of programs).
Writing the interrupt handler was a very interesting experience.
The first attempt was written in C. This is a "great" idea and
almost (as in not quite) worked. The bugs that it had are those
frustrating type. You load the driver, run your test program and
if you run the test program once or twice it appears to be all
right. But run it three or four times and look out - I would get
the "WILD INTERRUPT" message scrolling all over the screen.
After spending three fourths of an entire weekend working on the
C version of the handler I decided that it was time to learn how
to use assembler (I had some experience, but not more than
changing 10 lines in an already working routine). From the first
attempt, I had a good feel for what the driver had to do to get
the job done. The second attempt was then underway. I wrote the
driver, assembled it, corrected all the dumb mistakes, and then
debugged it. The debugging process used simple test programs that
called the handler for one function at a time and a borrowed DEC
VT-100 terminal (it's real difficult to see what characters are
sent by watching the modem lights). Anyway, I got it working and
had Richard Evers call in to test the handler when Fido was
running. It worked!!!
I was feeling real good when Richard asks "What about the 0 or
Outside command?" We tried it and no, it didn't work. So, back to
the editor I went and within two hours I had the problem solved
and when we tested it and everything worked fine it "made my
day." I did run into a few minor problems after the initial
success, but they were all easily corrected (like using the right
/J switch for Fido).
So now all you Z-100 owners need not despair - you too can run
Fido. The interrupt handler and documentation can be retrieved
from the Colorado Springs HUG board (128/11). All you need then
is Fido_gen and all the necessary support files and
documentation. Good luck and long live Z-Fido!!!
-----------------------------------------------------------------
Fidonews Page 9 21 Apr 1986
=================================================================
COLUMNS
=================================================================
Notes from Abroad
The Continuing Modem Saga
As I'm sure you all know we have a modem crisis in Europe. Here
are my latest contributions to the saga.
After hearing reports that the Dataflex modem was finally working
with Fido, I decided I would try it out for myself. I had a very
early version of this modem, and had been testing it six months
ago, but no joy. Then I heard that Helge Vindenes (4703) had
been so exited by the Dataflex modem that he had jumped on a
plane and flew over to London just to pick one up!
I went to see Dataflex and they seemed very keen to help out. I
spoke at length to Bob Manekshaw, the guy who wrote the ROM
software for the modem, and he demonstrated the modem calling
Jersey_Fido (formerly Hughs_Fido 4406). The Dataflex supports
300 and 1200/75 and as far as I can tell it is fully Hayes
compatible. It's an internal (card) modem, but there is a boxed
version coming shortly.
We called Jersey_Fido at 1200/75 and 300 baud but the 12/75 link
was a bit shaky. We got through a couple of times at 1200/75 but
other times we weren't so lucky. As I said Dataflex seemed keen
to help and in fact are going to run a Fido of their own shortly
(4412).
After spending the whole day at Dataflex I went home and set up
the Dataflex modem on the Compulink Board. I had a few problems
but it was my fault. I had another Dataflex multi-function card
in my machine which had two COM ports attached. When I fitted
the modem card it clashed with the existing COM ports. The modem
can be set up as either a modem on startup, or a COM port (a
standard 25 way D type is provided). After realizing my mistake
with the clashing COM ports I set the modem to COM2, and as a
modem on startup and plugged it in.
The modem needs a full length slot and took a little fiddling to
get it in straight. The telephone lead (British Telecom modular)
is at the top of the mounting plate, and there is a volume knob
at the bottom. Between these two is the 25 way "D" type
connector when the board is used as a COM port.
Once fitted in my Compaq I booted up and ran the QMODEM comm
program to do some testing. The modem is actually supplied with
PC-TALK but I prefer QMODEM. I had a preliminary version of the
manual which had known mistakes. None the less the manual proved
very informative and gave good coverage to the "AT" command set.
The manual also contains the complete PC-TALK manual.
So far so good! Now came the big test, I had spoken earlier with
Hugh Ashborn (Jersey_Fido) and he suggested I use his FIDOMDM.BBS
Fidonews Page 10 21 Apr 1986
string. I did this and sure enough it worked fine.
The first few callers came in at 300 which worked OK, and then I
got a call from Bob Manekshaw to test the modem at 1200/75. This
worked also much to my relief and I happily left the modem
running all night. I set the volume pot to full (very loud!) and
let it get on with it. The first few calls were OK but then
things went a little strange. I could hear the modem auto-baud
rate selecting but the tones seemed to be shorter in length that
before. I sat watching and listening for the next few minutes
and the same thing happened time after time. Of course I
couldn't tell what baud rate the caller was using as he didn't
actually get in, but I suspect it was 1200/75.
I then got a call from Martin Read (LaserMail 4410) and we
decided to test the modem at 1200/75. We had various problems at
1200/75 ranging from no connection to problems I can best
describe as "strange". The modem seemed fairly reliable at
detecting an incoming call at 1200/75 but it did not always
trigger Fido at the correct baud rate. I could hear that the
tones were 1200/75 but Fido had connected at 300 baud.
Occasionally Fido did connect at 1200 and things went smoothly.
More often than not though callers at 1200/75 were connected at
300 baud.
This is an improvement over my other modems that refused point
blank to even work at 1200/75 with the Compaq. From the callers
point of view a connection even at 300 baud when he is using
1200/75 is better than failing to connect.
I'm sure that all the modem manufacturers are extremely upset at
IBM's lack of support for split baud rates as it has caused them
(and us) a lot of unnecessary aggravation. I think Dataflex
should be congratulated an making their modem operate as well as
it does at 1200/75. It is a full-fledged computer in its own
right. Unfortunately, in the fickle world of computing nothing
but the best is good enough, and even then it's probably too
expensive. I see the Dataflex IDM modem as one of the best so
far, and I'm going to stick with it. Sure it has a few problems
but it performs pretty well even though.
From the sysops point of view the fact that it doesn't work at
1200/75 properly is an aggravation. You can of course disable
the auto-baud rate selection (as I have done for the time being)
and just let it work at 300. I have had it on line for about a
week and apart from the problems I had when I was testing at
1200/75 it has connected and worked very well for about 95% off
the time.
From the non-sysop's point of view it works (almost) perfectly.
Most people will be using it to originate calls, which it does
very well. I think I have struck up a good relationship with
Dataflex and with their cooperation (and ours through feedback) I
think we all could be onto a winner.
-----------------------------------------------------------------
Fidonews Page 11 21 Apr 1986
THE WORLD OF COMPUTING
written by Reuven M. Lerner
FidoMail 107/33
Hello, and welcome to The World of Computing #4! This week
will be devoted to a new copy-protection scheme as well as
reviews of two books that I read recently.
About mail: I love to get mail about what I'm writing, be it
positive or negative. Unless I'm absolutely overwhelmed by
FidoMail, which hasn't happened yet, I promise to reply within
two days of my reading it.
Copy Protection....sometimes
What is one of the most interesting new forms of copy-
protection has been introduced by MECA, whose best-selling
program "Managing Your Money" has received good reviews by most
magazines. I read about "Russian Roulette Pirating" in Personal
Computing magazine, and was intrigued by the problems that it
causes while solving old ones.
To understand their form of protection, let me review one of
the similar types of copy-protection, the key-disk technique.
The idea is that you can make as many copies as you want of a
product, but you must show the original disk when you start up
the program. Many software companies have started using this
system recently, mostly on the IBM and Macintosh computers.
The idea is that it allows you to make copies, and thus
prevent trashing the original disk, without actually letting you
roam free handing copies out to your friends (which,
unfortunately, some people do when there is no protection at
all). It does its job well, but there is still the problem of
what happens when you spill coffee on the original disk and have
to wait two weeks for a new copy.
The new MECA system is similar to the key-disk, except that
it doesn't ask you for the key disk every time. Every few uses,
from 1 to 300, the computer asks you to insert the key disk.
That allows for copies to be functional, and the originals to be
safe most of the time.
If you don't have the key disk, you can either run out to
your friend who copied it for you, or buy a new copy of the
program for $200 from MECA, no questions asked (they must be
pretty confident that this is going to work if they won't ask a
single question about why the person needs a new key disk).
Of course, random key-disk protection is much less
objectionable that regular key-disk protection, and it shows
remarkable caring on the part of the company for what the
consumer wants. The only problem is that it still doesn't allow
Fidonews Page 12 21 Apr 1986
the person to make fully functional backups, something which
keeps me from wholeheartedly recommending the system.
As I said before, it means that the companies are trying to
make the consumers happy, and are willing to lose a few customers
in order to do so. MECA is a company to be emulated, especially
by the companies that put out those terrible worm-code programs
that destroy disks physically.
One such worm program was written up in a recent InfoWorld,
and it's such an example that I'll share it with you here.
A company executive recently bought a package for his company
that used the Hard Disk Prolok scheme, one which physically
damages disks if copies are made, but allows you to make copies
onto hard disks. Unfortunately, the company had several copies,
and their entire hard disk was wiped out because of the Prolok
protection.
That is not only terrible to hear about, but is downright
unethical as well. How can a company such as Vault, who makes
the Prolok program, eithically distribute programs that they know
might damage hard disks containing literally megabytes of crucial
data?
If I were handing out awards as some other columnists do,
Vault would get the Crumpled Diskette Award.
Whole Earth Software Catalog
I don't remember where I first read about the Whole Earth
Software Catalog. I do remember, though, that it didn't get such
great reviews. Well, despite all that's been said, I bought the
catalog for 1986, interestingly called the 2.0 edition.
First off, I don't know why they call it a software catalog.
It's primarily software, but they have hardware reviews, magazine
and book reviews, predictions for this year, and a lot of other
things that, in my mind, don't exactly fit into the "software"
category.
Stuart Brand, the Editor in Chief of the catalog, obviously
spent time on this book, but in my mind, not enough. The book
reads more like a long magazine than a real book, with short
reviews, lots of pictures, and slick magazine-type pages. Each
review is preceeded by a cute, but unnecessary quip about the
product.
The way that it is organized is one of the catalog's
redeeming factors. It has eleven main chapters, each devoted to
another kind of activity (e.g. writing, playing, programming,
learning), which makes it easy to look up products that you need.
There is an index for most major computers, as well as a full
index for those of us who like to browse through indexes and see
Fidonews Page 13 21 Apr 1986
what's in the book.
Can I recommend this book? Not unless you get it for much
less than the recommended $17.95. I can't see its value being
much more than $9 or so. Better luck next time, in 1987.
The Complete Handbook of Personal Computer Communications
This is the best book of its kind that I've ever seen,
anywhere! From plugging in your modem, to understanding bits and
baud, to error-checking protocols, to a two-page description of
Fido, Alfred Glossbrenner deserves to charge more than just
$14.95 for this masterpiece of a book.
In a huge book that details everything that you'd ever want
to know about telecommunicating, Mr. Glossbrenner has done a
fine job in his research and in his writing.
I saw the first edition of the book (the second edition has
been out only about four months), and used it constantly whenever
I didn't know what was happening. The second one corrects
mistakes that were in the first edition, gives more hints (called
"Online Tips"), and much more!
It's almost impossible to describe this book, but once you
get it, I think that you'll agree that it's the ultimate resource
material for people like you and me.
Next time
That's about it for this week. Next time, I'm going to talk
about educational programs that I've tested, and the future of
computers in schools. Until next week, happy computing!
(c)1986 Reuven M. Lerner. All Rights Reserved. Permission
is given to copy this column so long as it is for non-profit use.
If you wish to use it for other than non-profit use, write to the
author at 21 Old Westbury Road, Old Westbury, NY 11568, or at
FidoMail 107/33.
-----------------------------------------------------------------
Fidonews Page 14 21 Apr 1986
REPRINTED FROM PC Week, March 04, 1986
Copyright (C) 1986 Ziff Davis Publishing Company
License and permission to reprint per terms of contract number
PCW2-198 dated March 13, 1986 have been granted to Ken Kaplan,
Executive Director, International FidoNet Association.
File-Compression Program Lowers User's
Connect Costs While Increasing Disk Space
By Garry Ray
One of the problems with PC disk files is they never stop coming.
The more floppies you have, the more you need. The larger your
hard disk, the smaller it seems to get. And it probably goes
without saying that adding a modem to any PC system at least
doubles the monthly telephone bill.
ARC, a unique utility program from System Enhancement Associates,
of Wayne, N.J., solves many of these problems. Originally
released in early 1985, the program has quickly become a standard
on the PC bulletin-board circuit, replacing other popular "public
domain" programs such as Squeeze (SQ), Unsqueeze (USQ) and
Library Utility 86 (LU86).
The primary function of all these utilities is to compress and
link disparate files into a single, smaller whole. The immediate
and most significant benefit passes to those who regularly
transfer files from one PC to another via telephone lines. With
ARC, you can lop off excessive telephone-connection charges by
converting, for example, 300K bytes of text files into a single
file of less than 160K bytes.
The result? A simple 1,200-bit-per-second file transfer between
the East and West coasts would cost about $7 less than otherwise
(based on AT&T day-rate charges). Do that just a few times and
you've paid for the program. A few more and you're making money.
Connect charges aren't the only things you'll save with ARC.
Floppy- and hard-disk space can be vastly increased by storing
like files in archives. It's fairly evident that converting that
same 300K bytes of files into a 160K-byte archive file will pay
off in two ways_better disk organization and more optimal use of
the storage device.
Using ARC is about as simple as anything could be. The program is
invoked from the DOS command line by typing "ARC," with a series
of command-line switches and file specifications determining the
action the program will take.
When invoked without any commands, ARC will merely display a
copyright notice and a command summary, and then return the user
to DOS. The command summary is the only "on-line help" the
program displays, though it certainly is sufficient, given the
simplicity of ARC.
Fidonews Page 15 21 Apr 1986
The most important program commands are Add, Move and Extract.
Like the rest of the ARC commands, these are invoked by typing
the first letter of the command on the DOS command line,
immediately after the command "ARC."
A typical command sequence might be "ARC A TEXT *.TXT," which
means "add to an archive file called `TEXT.ARC' all the files on
the current subdirectory and drive with the file-name extension
`.TXT'." The Move command, specified on the command line with
the letter "M," would simply delete all the desired files from
the DOS directory after they had been added to the archive file.
While it's creating and adding to archive files, ARC performs a
number of additional tricks. Every file is individually examined
to determine its type and structure, at which point ARC selects
one of three built-in file-compression techniques. The
compression algorithms are extremely complex, but suffice it to
say that text files are usually reduced in size by 40 to 60
percent, and binary files by anywhere from 15 to 35 percent.
Files can be added to an archive with no compression at all
(using the "suppress" command), and later packed and squeezed by
invoking the "convert" command switch.
Finally, the Extract command (invoked with either "x" or "e" on
the command line) is the tool that allows users to remove files
from the archive. Using the above example, the entire contents of
an archived file can be extracted to original form by typing "ARC
X TEXT," in which case all files are "uncompressed" and placed in
the current subdirectory as individual files.
Users can also use standard DOS file-specification commands to
select individual or groups of files for extraction. For
instance, all 1-2-3 worksheet files could be extracted by the
command "ARC X LOTUS *.WKS".
In any case, the original archive file retains all its original
contents, though unneeded files can be subsequently deleted with
the ARC "delete" command.
If you've forgotten which archive file contains what, two ARC
commands allow you to get either short or long archive
directories. The short listing displays the file name, length,
original file creation date, and the uncompressed length of each
file.
Inherent Verbosity
The long listing (available through the "verbose" command), shows
more detailed information, such as each file's compressed size,
the compression technique used, the creation date and time, and
the Cyclical Redundancy Check (CRC) value for each file. The CRC
value is used by ARC to determine the integrity of the file
during compression and extraction, though a user command, "test,"
also uses the CRC value for the same purpose.
Fidonews Page 16 21 Apr 1986
In addition to all the primary archiving and compression
commands, ARC allows the archived file contents to be either
viewed, printed or even executed with the "run" and "print"
commands. Run does exactly that -- it runs the .COM, .EXE, .BAT
or .BAS file specified on the ARC command line.
This did not seem to us a highly useful command, since the
processing overhead required by ARC just didn't seem to be worth
the trouble. Instead, it seems easier just to "unarchive" the
appropriate file and run it in the normal manner. Additionally,
the "run" command does not accept command-line parameters for the
program being invoked.
Last but not least is ARC's "garble" command, which allows the
user to encrypt files as they are added to the archive. A user-
supplied password of any length can be used for encryption and
must be subsequently supplied for any other ARC operation
regarding the file(s).
Excellent Support
System Enhancement Associates' technical support for ARC is
outstanding. The program is regularly updated to incorporate new
features, or to repair bugs that may have entered into previous
versions. A $50 maintainance fee provides five annual update
disks.
Program documentation, license policies and revision histories
are included in a DOS text file distributed with the program in
ARC format. Those who purchase ARC directly from the developer
also receive a number of "free" utility programs and the source
code (in both C and 8086 assembler) for all programs.
In sum, ARC is a fairly sophisticated and eminently useful
product for which savvy users will find a number of applications.
The fact that it is distributed as a "shareware" program and that
reasonable site licenses are available makes this a good
candidate for at least a trial run.
-----------------------------------------------------------------
Fidonews Page 17 21 Apr 1986
=================================================================
WANTED
=================================================================
HELP WANTED
REGION 19 TEXARKANA COORDINATOR
We are now looking for a Fido sysop to assume the position as
Region 19 Coordinator supporting the states of Oklahoma, Texas,
Arkansas, and Louisiana. This person will be responsible for all
of the duties of a Region Coordinator as described in the current
POLICY1.DOC. This sysop must have adequate time to devote to
supporting Region 19.
This Fido will be the first to receive the NODEDIFF.Ann,
FidoNews, etc. and will be expected to make them available to the
other Networks in Region 19. This Fido will be responsible for
taking applications for and encouraging the formation of new Nets
in Region 19. This Fido will be expected to resolve disputes in
Region 19 so she/he must be a good problem solver.
We would prefer someone with a 2400 baud modem, and that has been
up and running for no less than three months. We will accept
applicants from any node within the Region 19 area. Please do
NOT apply if you are already a Net coordinator.
Please submit your qualifications, including a paragraph on why
you think you would do a good job as the Region 19 Coordinator,
to Ken Kaplan at Fido 1/0.
-----------------------------------------------------------------
Fidonews Page 18 21 Apr 1986
=================================================================
FOR SALE
=================================================================
ENTERTAINMENT SOFTWARE FOR YOUR PC!
SUPERDOTS! KALAH!
Professional quality games include PASCAL source! From the
author of KALAH Version 1.6, SuperDots, a variation of the
popular pencil/paper DOTS game, has MAGIC and HIDDEN DOT
options. KALAH 1.7 is an African strategy game requiring
skill to manipulate pegs around a playing board. Both games
use the ANSI Escape sequences provided with the ANSI.SYS
device driver for the IBM-PC, or built into the firmware on
the DEC Rainbow. Only $19.95 each or $39.95 for both
exciting games! Please specify version and disk format.
These games have been written in standard TURBO-PASCAL and
run on the IBM-PC, DEC Rainbow 100 (MSDOS and CPM), CPM/80,
CPM/86, and PDP-11. Other disk formats are available, but
minor customization may be required.
BSS Software
P.O. Box 3827
Cherry Hill, NJ 08034
For every order placed, a donation will be made to the Fido
coordinators! Also, if you have a previous version of KALAH
and send me a donation, a portion of that donation will also
be sent to the coordinators. When you place an order, BE
CERTAIN TO MENTION WHERE YOU SAW THE AD since it also
appears in PC Magazine and Digital Review.
Questions and comments can be sent to:
Brian Sietz at Fido 107/17
(609) 429-6630 300/1200/2400 baud
-----------------------------------------------------------------
Fidonews Page 19 21 Apr 1986
Now available from Micro Consulting Associates!!
Public Domain collection - 300+ "ARC" archives - 10 megs of
software and other goodies, and that's "archived" size! When
unpacked, you get approximately 17 megabytes worth of all kinds
of software, from text editors to games to unprotection schemes
to communications programs, compilers, interpreters, etc...
This collection is the result of more than 10 months of intensive
downloads from just about 100 or more BBS's and other sources,
all of which have been examined, indexed and archived for your
convenience. Starting a Bulletin Board System? Want to add on
to your software base without spending thousands of dollars? This
is the answer!!!
To order the library, send $100 (personal or company check,
postal money order or company purchase order) to:
Micro Consulting Associates, Fido 103/511
Post Office Box 4296
200-1/2 E. Balboa Boulevard
Balboa, Ca. 92661-4296
Please allow 3 weeks for delivery of your order.
Note: No profit is made from the sale of the Public Domain
software in this collection. The price is applied entirely to
the cost of downloading the software over the phone lines,
running a BBS to receive file submissions, and inspecting,
cataloguing, archiving and maintaining the files. Obtaining this
software yourself through the use of a computer with a modem
using commercial phone access would cost you much more than what
we charge for the service...
Please specify what type of format you would like the disks to be
prepared on. The following choices are available:
IBM PC-DOS Backup utility
Zenith MS-DOS 2.11 Backup Utility
DSBackup
Fastback
Plain ol' files (add $50, though, it's a lot of
work and takes more diskettes...)
Add $30 if you want the library on 1.2 meg AT disks (more
expensive disks). There are no shipping or handling charges.
California residents add 6% tax.
For each sale, $10 will go to the FidoNet Administrators.
-----------------------------------------------------------------
Fidonews Page 20 21 Apr 1986
SEAdog Electronic Mail System
Special Offer for FidoNet Sysops
System Enhancement Associates, the makers of the popular ARC file
archive utility, are proud to announce the release of the SEAdog
electronic mail system.
SEAdog is a PC-based electronic mail system which is fully
FidoNet compatible. In addition to all the functionality of
FidoNet mail, SEAdog adds the following:
o User directory support, for automatic lookup of node numbers
o Return receipts
o Audit trails
o Message forwarding, with or without a retained copy
o Twenty four hour mail reception
o High priority mail for immediate delivery
o The ability to request files and updates of files from other
SEAdog systems.
o No route files needed!
o A full screen user interface that our beta test sites fell in
love with!
SEAdog is NOT a bulletin board system, but it can be used as a
"front end" for Fido (version 11q or later), allowing you to add
the full functionality of SEAdog to your existing system.
SEAdog normally sells for $100/node, but for a limited time only
we are offering SEAdog to registered FidoNet sysops for only $50!
Orders may be placed by sending a check or money order to:
System Enhancement Associates
21 New Street, Wayne NJ 07470
Or by calling (201) 473-5153 (VISA and MasterCard accepted).
-----------------------------------------------------------------
Fidonews Page 21 21 Apr 1986
=================================================================
NOTICES
=================================================================
The Interrupt Stack
27 Apr 1986
2 AM - Beginning if Daylight Savings Time; DO NOT change your
clock!
3 May 1986
FidoBaby's first birthday.
19 May 1986
Steve Lemke's next birthday.
24 Aug 1989
Voyager 2 passes Neptune.
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1/1.
-----------------------------------------------------------------
Daylight Savings Time
This coming Sunday, the 27th of April, most of the country goes
on Daylight Savings Time. FidoNet does NOT observe Daylight
Savings Time, so do NOT advance your system clock.
If you want to advance your system clock anyway, then you must
also advance all of your mail events.
-----------------------------------------------------------------