1080 lines
50 KiB
Plaintext
1080 lines
50 KiB
Plaintext
Volume 3, Number 16 21 April 1986
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| - FidoNews - /|oo \ |
|
||
| (_| /_) |
|
||
| Fido and FidoNet _`@/_ \ _ |
|
||
| Users Group | | \ \\ |
|
||
| Newsletter | (*) | \ )) |
|
||
| ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (C) Copyright 1986 by IFNA (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief: Thom Henderson
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
|
||
FidoNews is the official newsletter of the International FidoNet
|
||
Association, and is published weekly by SEAdog Leader, node 1/1.
|
||
You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission standards are contained in the file
|
||
FNEWSART.DOC, available from node 1/1.
|
||
|
||
The contents of the articles contained here are not our
|
||
responsibility, nor do we necessarily agree with them.
|
||
Everything here is subject to debate.
|
||
|
||
|
||
|
||
|
||
Table of Contents
|
||
|
||
1. EDITORIAL
|
||
Spaghetti Coding
|
||
2. ARTICLES
|
||
Information needed on Fidonet compatible clones
|
||
Automated File Relays
|
||
Fido lives on a Zenith Z-100
|
||
3. COLUMNS
|
||
Notes from Abroad
|
||
The World of Computing: Copy protection and book reviews
|
||
PC Week reviews ARC
|
||
4. WANTED
|
||
Texarkana Regional Coordinator
|
||
5. FOR SALE
|
||
Entertainment Software for your PC!
|
||
Public Domain Software Library Sale!!
|
||
Special Offer to FidoNet Sysops
|
||
6. NOTICES
|
||
The Interrupt Stack
|
||
FidoNet does NOT observe Daylight Savings Time
|
||
|
||
|
||
|
||
|
||
Fidonews Page 2 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
EDITORIAL
|
||
=================================================================
|
||
|
||
Jim Butterfield
|
||
Spaghetti Coding
|
||
|
||
I recently received a letter from Syd Bolton, who was
|
||
most enthusiastic about "free-form" programming. You know the
|
||
sort of thing -- the first step is to turn the computer on. The
|
||
next is to write a dozen lines or so; after that, decide what you
|
||
want to do. Under no circumstances is any planning to take place
|
||
before switching on, and work with pencil and paper is
|
||
unthinkable.
|
||
|
||
I'm overstating the case, of course. The point is -- and
|
||
several writers have pointed this out lyrically -- it's great fun
|
||
to horse around with code and see how (or if) you can get things
|
||
to come out. I've even been quoted myself as saying that one of
|
||
the marks of a virtuoso programmer is the ability to convince
|
||
people that the program you ended up with was really what you
|
||
intended to do in the first place, more or less. To put it
|
||
poetically, it's a heck of a hacker who can hook the hawks of
|
||
hoke code for hicks.
|
||
|
||
Fooling around can be a lot of fun, whether you do it in
|
||
school, at the beach, or while programming. If your object is to
|
||
have a good time, go ahead, with my blessing. If your object is
|
||
to have a good program, well...
|
||
|
||
It's a lot of fun to eat a good meal: it's not so much
|
||
fun to plan and prepare it beforehand, or to wash the dishes
|
||
afterward. I suspect it's the same thing with programs. It's
|
||
more fun to dive in and chop at the code: it's much less fun to
|
||
plan before and document afterward. When I look at some
|
||
programs, I sometimes wish that the programmer had worn a bib
|
||
when writing it. I can see the litter of leftover and patched-up
|
||
code in there.
|
||
|
||
If you are writing a one-shot program for your own use,
|
||
go to it. If it slugs away for two minutes and then reports
|
||
?SYNTAX ERROR IN LINE 5870, chop in a repair and run it again.
|
||
And if the repair doesn't work, try another chop. If THAT
|
||
doesn't work, sit down and think. Sound familiar? That's what
|
||
you get when you hack at a program, and it can be lots of fun.
|
||
|
||
But be aware that free flight coding does have its
|
||
problems. Such as: (i) you drag the program out six weeks later
|
||
and can't read it yourself; (ii) you make a small change and the
|
||
whole thing collapses for no apparent reason; (iii) you give away
|
||
or sell copies, and people phone you telling you things that
|
||
don't work properly; (iv) your program wins a prize in "worst
|
||
code of the year"; (v) somebody sends you a "cleaned up" rewrite
|
||
of your program that uses one-third of the lines; (vi) you wrote
|
||
it for ten provinces, and it turns out that it cannot be
|
||
converted to fifty states without a total rewrite.
|
||
Fidonews Page 3 21 Apr 1986
|
||
|
||
|
||
It's okay to write green slime coding. But keep in mind
|
||
the following thoughts. If you want to publish or sell it,
|
||
you'll also want to do massive cleaning up. Also, well-shaped
|
||
coding gives you a good feeling; you feel proud of not just the
|
||
program, but also the coding it contains. Moreover, if you get
|
||
into trouble, you can scrap the old program and start over. When
|
||
you rewrite it you may have nothing written down, but you'll have
|
||
a plan: the organization of the program as you perceived it on
|
||
the previous write.
|
||
|
||
If you write "natcheral" code and enjoy it, and if your
|
||
programs work, good for you! It's hard to knock a working
|
||
program. But there's another factor: pride of workmanship.
|
||
Sometimes you just feel good about a program that you have
|
||
written. You may not know why, but you'd like to show the coding
|
||
to others because the parts fit together so neatly. When this
|
||
happens, it's usually a question of style. Often, you've solved
|
||
a specific program in a general way. For example, you might have
|
||
calculated the average value of five numbers, but you've done it
|
||
in such a way that a minor change would perform the same
|
||
calculation for a hundred values. You've gone from the specific
|
||
task to a general solution, and that makes you a more powerful
|
||
programmer.
|
||
|
||
You might have heard a lot of talk about "structured",
|
||
"goto-less", or "top-down" programming. These are essentially
|
||
concerned with planning, rather than programming as such
|
||
(although it's easy to be misled by the mechanics). Their
|
||
general objective is to encourage you (or shove you) into
|
||
creating a program that flows in an orderly way, rather than
|
||
hopping around. A program should be something like a railway
|
||
line, with main line, spurs, and sidings clearly identified; it
|
||
shouldn't be like a city map with no clear path from one point to
|
||
another. I see programs in which the programmer seems to have
|
||
arrived in a maze of twisting little passages, all the same.
|
||
|
||
You might think that you write only one line at a time,
|
||
but it's not so. If you write FOR J=1 TO 10 in a program, you're
|
||
engaged in planning ahead. You plan to repeat the next new
|
||
statement ten times, and you've committed yourself to eventually
|
||
writing a NEXT J. There's no such thing as truly barefoot
|
||
programming -- your mind is always thinking a few lines ahead,
|
||
and you're always planning. The real danger is to write IF X>10
|
||
GOTO 575 hoping that when you get to 575 you will have figured
|
||
out what to do when X is greater than 10.
|
||
|
||
But whether or not you admit to planning, whether or not
|
||
you do more of it or less of it, do continue to have fun with
|
||
your programming. And if you can break the rules and still come
|
||
up with a neat program that works well, more power to you.
|
||
|
||
Copyright (c) 1985 Jim Butterfield. Permission to reprint is
|
||
hereby granted, provided this notice is included in the reprinted
|
||
material.
|
||
|
||
-----------------------------------------------------------------
|
||
Fidonews Page 4 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
Bill Allbritten, 11/301
|
||
|
||
Information needed on Fidonet compatible clones
|
||
|
||
|
||
As a not too technically sophisticated user, I find that
|
||
documentation is a necessity to get anything done. It was good
|
||
to see Tom Jennings call for an udpdate on Fidonet protocols.
|
||
One other area that, if it has not already been updated, that
|
||
could stand some attention is compatibility between Fido and the
|
||
proliferation of clones, PC,XT, and AT, that have hit the market.
|
||
Ditto for all of the so-called Hayes compatible modem clones out
|
||
there. If you live in the boonies and do most of your purchasing
|
||
mail order, you need to hit things right the first time or suffer
|
||
a lot of inconvenience if not expense. Therefore, I would like
|
||
to update the documenation on compatible computers and modems.
|
||
|
||
If you are running FIDO on a machine NOT listed in the original
|
||
documentation and/or using a modem NOT described in the original
|
||
FIDO documentation, would you send the following information to
|
||
me at 11/301? I will then compile the list and send in to this
|
||
journal. Please set up your information as follows so I can read
|
||
it into my database. A carriage return and line feed should
|
||
appear between fields. I think this will help a lot of us
|
||
looking at the very inexpensive machines now on the market.
|
||
Specific machines being sought are the generic clones, the AT
|
||
clones, and any exotics such as the Apricot that folks have had
|
||
some luck with.
|
||
|
||
For computers, please send the following: (no commas in fields,
|
||
please)
|
||
|
||
BRAND NAME
|
||
DEALER NAME
|
||
DEALER ADDRESS (City State ZIP)
|
||
DEALER PHONE
|
||
RAM currently installed
|
||
ACCESSORY BOARDS (up to 65 characters)
|
||
ACCESSORY BOARDS (up to 65 characters)
|
||
TYPE of VIDEO card
|
||
MULTITASKING SOFTWARE (if appropriate)
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS (each comment line up to 65 characters
|
||
YOUR NAME
|
||
YOUR ADDRESS
|
||
YOUR PHONE (data or voice, please indicate--Last three items are
|
||
optional)
|
||
|
||
For modems, please send the following: (no commas in fields,
|
||
Fidonews Page 5 21 Apr 1986
|
||
|
||
|
||
please)
|
||
|
||
BRAND NAME
|
||
DEALER NAME
|
||
DEALER ADDRESS (City State Zip)
|
||
PROTOCOLS SUPPORTED
|
||
MODEM MASK SWITCH SETTING (16, 32, 64, 128, etc)
|
||
OTHER SWITCH SETTINGS ( 1U 2D; 1ON 2OFF as appropriate)
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS
|
||
COMMENTS (each comment line up to 65 characters)
|
||
YOUR NAME
|
||
YOUR ADDRESS
|
||
YOUR PHONE (date or voice-please indicate--Last three items
|
||
optional)
|
||
|
||
You do not need to respond to all fields. Just enter a blank
|
||
line for any field not use. Thanks.
|
||
|
||
I look forward to hearing from you on 11/301. I will collect
|
||
this material until MAY 1, 1986, and then send it in. It will be
|
||
available sooner on my board in file area 4 as COMPAT.TXT.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 6 21 Apr 1986
|
||
|
||
|
||
Thom Henderson, 107/8
|
||
System Enhancement Associates
|
||
|
||
Automated File Relays
|
||
|
||
|
||
A common problem faced by FidoNet sysops is how to reliably
|
||
automate the relaying of files, particularly the node list and
|
||
newsletter. Our Robot program has assisted greatly in this task,
|
||
but problems sometime arise when file mailings are delayed.
|
||
|
||
In a typical case, a sysop will expect to receive the node list
|
||
on, say, Sunday morning, and will pass it on by placing entries
|
||
in the Robot control file like so:
|
||
|
||
Sun input\nodelist.a* 107/4
|
||
Sun input\nodelist.a* 107/5
|
||
Sun input\nodelist.a* 107/6
|
||
|
||
|
||
This works, but has a drawback. If the node list isn't received
|
||
when expected, then the relay messages are still sent. A
|
||
somewhat better approach makes use of the EXIST keyword, like so:
|
||
|
||
Sun exist input\nodelist.a* 107/4
|
||
Sun exist input\nodelist.a* 107/5
|
||
Sun exist input\nodelist.a* 107/6
|
||
|
||
|
||
This is a bit better because the relay messages won't be sent
|
||
unless there is a node list to be relayed. In most cases this
|
||
will work properly. But consider the case where the node list is
|
||
delayed a day, for whatever reason. Robot won't create the
|
||
messages because the node list wasn't there on Sunday.
|
||
|
||
A more reliable method involves two directories, and makes use of
|
||
Robot's "demand mode". Assuming two directories called INPUT and
|
||
OUTPUT, an external event can be set to run immediately after the
|
||
national mail hour, like so:
|
||
|
||
:relay
|
||
if not exist input\nodelist.a* goto nolist
|
||
del output\nodelist.a*
|
||
copy input\nodelist.a* output
|
||
del input\nodelist.a*
|
||
robot list
|
||
|
||
:nolist
|
||
if not exist input\fnews*.arc goto nonews
|
||
del output\fnews*.arc
|
||
copy input\fnews*.arc output
|
||
del input\fnews*.arc
|
||
robot news
|
||
|
||
:nonews
|
||
|
||
Fidonews Page 7 21 Apr 1986
|
||
|
||
|
||
The Robot control file to go with this would look something like
|
||
this:
|
||
|
||
list: output\nodelist.a* 107/3
|
||
list: output\nodelist.a* 107/4
|
||
list: output\nodelist.a* 107/5
|
||
news: output\fnews*.arc 107/3
|
||
news: output\fnews*.arc 107/4
|
||
news: output\fnews*.arc 107/5
|
||
|
||
|
||
The advantage to this approach is that the file relay messages
|
||
are triggered by the receipt of the file to be relayed. The
|
||
outgoing messages will be sent ONLY when a new file is received,
|
||
regardless of when that happens. If a node list is delayed a
|
||
day, or two, or four, it will still be properly sent.
|
||
|
||
|
||
Special note: In DOS 2.0 and 2.1 and IF EXIST cannot take a path.
|
||
If you do not have DOS 3.0 or 3.1, then it will be necessary to
|
||
change directories to test for the presence or absence of a file.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 8 21 Apr 1986
|
||
|
||
|
||
Joseph E Rock, Jr; 128/15
|
||
|
||
Z-Fido. Z-Fido? Z-Fido!
|
||
|
||
From what I have seen, most of the Fido BBS's are hosted on IBM
|
||
PCs or clones. I was not much of a BBS person until very
|
||
recently. When I went to the local Heath Users Group (HUG)
|
||
meeting the sysop of the local Fido Host (Richard Evers) was
|
||
there. During the discussion, he brought up the idea of getting
|
||
Fido to run on a Z-100. He said that the necessary software (an
|
||
interrupt handler) was not available for the Z-100. I thought:
|
||
"that can't be very difficult to write." And promptly volunteered
|
||
to produce the driver on my Z at home. Well, the warning that Tom
|
||
Jennings gives in the Generic.doc and Generic.asm files is true -
|
||
writing the driver is not a piece of cake. However, I did manage
|
||
to write and debug the software within one week. Now, my Z is
|
||
running as a FidoNode (128/15) except the times when I need to
|
||
use it for other things (like writing articles or trying to chase
|
||
the bugs out of programs).
|
||
|
||
Writing the interrupt handler was a very interesting experience.
|
||
The first attempt was written in C. This is a "great" idea and
|
||
almost (as in not quite) worked. The bugs that it had are those
|
||
frustrating type. You load the driver, run your test program and
|
||
if you run the test program once or twice it appears to be all
|
||
right. But run it three or four times and look out - I would get
|
||
the "WILD INTERRUPT" message scrolling all over the screen.
|
||
After spending three fourths of an entire weekend working on the
|
||
C version of the handler I decided that it was time to learn how
|
||
to use assembler (I had some experience, but not more than
|
||
changing 10 lines in an already working routine). From the first
|
||
attempt, I had a good feel for what the driver had to do to get
|
||
the job done. The second attempt was then underway. I wrote the
|
||
driver, assembled it, corrected all the dumb mistakes, and then
|
||
debugged it. The debugging process used simple test programs that
|
||
called the handler for one function at a time and a borrowed DEC
|
||
VT-100 terminal (it's real difficult to see what characters are
|
||
sent by watching the modem lights). Anyway, I got it working and
|
||
had Richard Evers call in to test the handler when Fido was
|
||
running. It worked!!!
|
||
|
||
I was feeling real good when Richard asks "What about the 0 or
|
||
Outside command?" We tried it and no, it didn't work. So, back to
|
||
the editor I went and within two hours I had the problem solved
|
||
and when we tested it and everything worked fine it "made my
|
||
day." I did run into a few minor problems after the initial
|
||
success, but they were all easily corrected (like using the right
|
||
/J switch for Fido).
|
||
|
||
So now all you Z-100 owners need not despair - you too can run
|
||
Fido. The interrupt handler and documentation can be retrieved
|
||
from the Colorado Springs HUG board (128/11). All you need then
|
||
is Fido_gen and all the necessary support files and
|
||
documentation. Good luck and long live Z-Fido!!!
|
||
|
||
-----------------------------------------------------------------
|
||
Fidonews Page 9 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
COLUMNS
|
||
=================================================================
|
||
|
||
Notes from Abroad
|
||
The Continuing Modem Saga
|
||
|
||
As I'm sure you all know we have a modem crisis in Europe. Here
|
||
are my latest contributions to the saga.
|
||
|
||
After hearing reports that the Dataflex modem was finally working
|
||
with Fido, I decided I would try it out for myself. I had a very
|
||
early version of this modem, and had been testing it six months
|
||
ago, but no joy. Then I heard that Helge Vindenes (4703) had
|
||
been so exited by the Dataflex modem that he had jumped on a
|
||
plane and flew over to London just to pick one up!
|
||
|
||
I went to see Dataflex and they seemed very keen to help out. I
|
||
spoke at length to Bob Manekshaw, the guy who wrote the ROM
|
||
software for the modem, and he demonstrated the modem calling
|
||
Jersey_Fido (formerly Hughs_Fido 4406). The Dataflex supports
|
||
300 and 1200/75 and as far as I can tell it is fully Hayes
|
||
compatible. It's an internal (card) modem, but there is a boxed
|
||
version coming shortly.
|
||
|
||
We called Jersey_Fido at 1200/75 and 300 baud but the 12/75 link
|
||
was a bit shaky. We got through a couple of times at 1200/75 but
|
||
other times we weren't so lucky. As I said Dataflex seemed keen
|
||
to help and in fact are going to run a Fido of their own shortly
|
||
(4412).
|
||
|
||
After spending the whole day at Dataflex I went home and set up
|
||
the Dataflex modem on the Compulink Board. I had a few problems
|
||
but it was my fault. I had another Dataflex multi-function card
|
||
in my machine which had two COM ports attached. When I fitted
|
||
the modem card it clashed with the existing COM ports. The modem
|
||
can be set up as either a modem on startup, or a COM port (a
|
||
standard 25 way D type is provided). After realizing my mistake
|
||
with the clashing COM ports I set the modem to COM2, and as a
|
||
modem on startup and plugged it in.
|
||
|
||
The modem needs a full length slot and took a little fiddling to
|
||
get it in straight. The telephone lead (British Telecom modular)
|
||
is at the top of the mounting plate, and there is a volume knob
|
||
at the bottom. Between these two is the 25 way "D" type
|
||
connector when the board is used as a COM port.
|
||
|
||
Once fitted in my Compaq I booted up and ran the QMODEM comm
|
||
program to do some testing. The modem is actually supplied with
|
||
PC-TALK but I prefer QMODEM. I had a preliminary version of the
|
||
manual which had known mistakes. None the less the manual proved
|
||
very informative and gave good coverage to the "AT" command set.
|
||
The manual also contains the complete PC-TALK manual.
|
||
|
||
So far so good! Now came the big test, I had spoken earlier with
|
||
Hugh Ashborn (Jersey_Fido) and he suggested I use his FIDOMDM.BBS
|
||
Fidonews Page 10 21 Apr 1986
|
||
|
||
|
||
string. I did this and sure enough it worked fine.
|
||
|
||
The first few callers came in at 300 which worked OK, and then I
|
||
got a call from Bob Manekshaw to test the modem at 1200/75. This
|
||
worked also much to my relief and I happily left the modem
|
||
running all night. I set the volume pot to full (very loud!) and
|
||
let it get on with it. The first few calls were OK but then
|
||
things went a little strange. I could hear the modem auto-baud
|
||
rate selecting but the tones seemed to be shorter in length that
|
||
before. I sat watching and listening for the next few minutes
|
||
and the same thing happened time after time. Of course I
|
||
couldn't tell what baud rate the caller was using as he didn't
|
||
actually get in, but I suspect it was 1200/75.
|
||
|
||
I then got a call from Martin Read (LaserMail 4410) and we
|
||
decided to test the modem at 1200/75. We had various problems at
|
||
1200/75 ranging from no connection to problems I can best
|
||
describe as "strange". The modem seemed fairly reliable at
|
||
detecting an incoming call at 1200/75 but it did not always
|
||
trigger Fido at the correct baud rate. I could hear that the
|
||
tones were 1200/75 but Fido had connected at 300 baud.
|
||
Occasionally Fido did connect at 1200 and things went smoothly.
|
||
More often than not though callers at 1200/75 were connected at
|
||
300 baud.
|
||
|
||
This is an improvement over my other modems that refused point
|
||
blank to even work at 1200/75 with the Compaq. From the callers
|
||
point of view a connection even at 300 baud when he is using
|
||
1200/75 is better than failing to connect.
|
||
|
||
I'm sure that all the modem manufacturers are extremely upset at
|
||
IBM's lack of support for split baud rates as it has caused them
|
||
(and us) a lot of unnecessary aggravation. I think Dataflex
|
||
should be congratulated an making their modem operate as well as
|
||
it does at 1200/75. It is a full-fledged computer in its own
|
||
right. Unfortunately, in the fickle world of computing nothing
|
||
but the best is good enough, and even then it's probably too
|
||
expensive. I see the Dataflex IDM modem as one of the best so
|
||
far, and I'm going to stick with it. Sure it has a few problems
|
||
but it performs pretty well even though.
|
||
|
||
From the sysops point of view the fact that it doesn't work at
|
||
1200/75 properly is an aggravation. You can of course disable
|
||
the auto-baud rate selection (as I have done for the time being)
|
||
and just let it work at 300. I have had it on line for about a
|
||
week and apart from the problems I had when I was testing at
|
||
1200/75 it has connected and worked very well for about 95% off
|
||
the time.
|
||
|
||
From the non-sysop's point of view it works (almost) perfectly.
|
||
Most people will be using it to originate calls, which it does
|
||
very well. I think I have struck up a good relationship with
|
||
Dataflex and with their cooperation (and ours through feedback) I
|
||
think we all could be onto a winner.
|
||
|
||
-----------------------------------------------------------------
|
||
Fidonews Page 11 21 Apr 1986
|
||
|
||
|
||
THE WORLD OF COMPUTING
|
||
written by Reuven M. Lerner
|
||
FidoMail 107/33
|
||
|
||
|
||
Hello, and welcome to The World of Computing #4! This week
|
||
will be devoted to a new copy-protection scheme as well as
|
||
reviews of two books that I read recently.
|
||
|
||
About mail: I love to get mail about what I'm writing, be it
|
||
positive or negative. Unless I'm absolutely overwhelmed by
|
||
FidoMail, which hasn't happened yet, I promise to reply within
|
||
two days of my reading it.
|
||
|
||
|
||
|
||
Copy Protection....sometimes
|
||
|
||
What is one of the most interesting new forms of copy-
|
||
protection has been introduced by MECA, whose best-selling
|
||
program "Managing Your Money" has received good reviews by most
|
||
magazines. I read about "Russian Roulette Pirating" in Personal
|
||
Computing magazine, and was intrigued by the problems that it
|
||
causes while solving old ones.
|
||
|
||
To understand their form of protection, let me review one of
|
||
the similar types of copy-protection, the key-disk technique.
|
||
The idea is that you can make as many copies as you want of a
|
||
product, but you must show the original disk when you start up
|
||
the program. Many software companies have started using this
|
||
system recently, mostly on the IBM and Macintosh computers.
|
||
|
||
The idea is that it allows you to make copies, and thus
|
||
prevent trashing the original disk, without actually letting you
|
||
roam free handing copies out to your friends (which,
|
||
unfortunately, some people do when there is no protection at
|
||
all). It does its job well, but there is still the problem of
|
||
what happens when you spill coffee on the original disk and have
|
||
to wait two weeks for a new copy.
|
||
|
||
The new MECA system is similar to the key-disk, except that
|
||
it doesn't ask you for the key disk every time. Every few uses,
|
||
from 1 to 300, the computer asks you to insert the key disk.
|
||
That allows for copies to be functional, and the originals to be
|
||
safe most of the time.
|
||
|
||
If you don't have the key disk, you can either run out to
|
||
your friend who copied it for you, or buy a new copy of the
|
||
program for $200 from MECA, no questions asked (they must be
|
||
pretty confident that this is going to work if they won't ask a
|
||
single question about why the person needs a new key disk).
|
||
|
||
Of course, random key-disk protection is much less
|
||
objectionable that regular key-disk protection, and it shows
|
||
remarkable caring on the part of the company for what the
|
||
consumer wants. The only problem is that it still doesn't allow
|
||
Fidonews Page 12 21 Apr 1986
|
||
|
||
|
||
the person to make fully functional backups, something which
|
||
keeps me from wholeheartedly recommending the system.
|
||
|
||
As I said before, it means that the companies are trying to
|
||
make the consumers happy, and are willing to lose a few customers
|
||
in order to do so. MECA is a company to be emulated, especially
|
||
by the companies that put out those terrible worm-code programs
|
||
that destroy disks physically.
|
||
|
||
One such worm program was written up in a recent InfoWorld,
|
||
and it's such an example that I'll share it with you here.
|
||
|
||
A company executive recently bought a package for his company
|
||
that used the Hard Disk Prolok scheme, one which physically
|
||
damages disks if copies are made, but allows you to make copies
|
||
onto hard disks. Unfortunately, the company had several copies,
|
||
and their entire hard disk was wiped out because of the Prolok
|
||
protection.
|
||
|
||
That is not only terrible to hear about, but is downright
|
||
unethical as well. How can a company such as Vault, who makes
|
||
the Prolok program, eithically distribute programs that they know
|
||
might damage hard disks containing literally megabytes of crucial
|
||
data?
|
||
|
||
If I were handing out awards as some other columnists do,
|
||
Vault would get the Crumpled Diskette Award.
|
||
|
||
|
||
|
||
Whole Earth Software Catalog
|
||
|
||
I don't remember where I first read about the Whole Earth
|
||
Software Catalog. I do remember, though, that it didn't get such
|
||
great reviews. Well, despite all that's been said, I bought the
|
||
catalog for 1986, interestingly called the 2.0 edition.
|
||
|
||
First off, I don't know why they call it a software catalog.
|
||
It's primarily software, but they have hardware reviews, magazine
|
||
and book reviews, predictions for this year, and a lot of other
|
||
things that, in my mind, don't exactly fit into the "software"
|
||
category.
|
||
|
||
Stuart Brand, the Editor in Chief of the catalog, obviously
|
||
spent time on this book, but in my mind, not enough. The book
|
||
reads more like a long magazine than a real book, with short
|
||
reviews, lots of pictures, and slick magazine-type pages. Each
|
||
review is preceeded by a cute, but unnecessary quip about the
|
||
product.
|
||
|
||
The way that it is organized is one of the catalog's
|
||
redeeming factors. It has eleven main chapters, each devoted to
|
||
another kind of activity (e.g. writing, playing, programming,
|
||
learning), which makes it easy to look up products that you need.
|
||
There is an index for most major computers, as well as a full
|
||
index for those of us who like to browse through indexes and see
|
||
Fidonews Page 13 21 Apr 1986
|
||
|
||
|
||
what's in the book.
|
||
|
||
Can I recommend this book? Not unless you get it for much
|
||
less than the recommended $17.95. I can't see its value being
|
||
much more than $9 or so. Better luck next time, in 1987.
|
||
|
||
|
||
|
||
The Complete Handbook of Personal Computer Communications
|
||
|
||
This is the best book of its kind that I've ever seen,
|
||
anywhere! From plugging in your modem, to understanding bits and
|
||
baud, to error-checking protocols, to a two-page description of
|
||
Fido, Alfred Glossbrenner deserves to charge more than just
|
||
$14.95 for this masterpiece of a book.
|
||
|
||
In a huge book that details everything that you'd ever want
|
||
to know about telecommunicating, Mr. Glossbrenner has done a
|
||
fine job in his research and in his writing.
|
||
|
||
I saw the first edition of the book (the second edition has
|
||
been out only about four months), and used it constantly whenever
|
||
I didn't know what was happening. The second one corrects
|
||
mistakes that were in the first edition, gives more hints (called
|
||
"Online Tips"), and much more!
|
||
|
||
It's almost impossible to describe this book, but once you
|
||
get it, I think that you'll agree that it's the ultimate resource
|
||
material for people like you and me.
|
||
|
||
|
||
|
||
Next time
|
||
|
||
That's about it for this week. Next time, I'm going to talk
|
||
about educational programs that I've tested, and the future of
|
||
computers in schools. Until next week, happy computing!
|
||
|
||
|
||
(c)1986 Reuven M. Lerner. All Rights Reserved. Permission
|
||
is given to copy this column so long as it is for non-profit use.
|
||
If you wish to use it for other than non-profit use, write to the
|
||
author at 21 Old Westbury Road, Old Westbury, NY 11568, or at
|
||
FidoMail 107/33.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 14 21 Apr 1986
|
||
|
||
|
||
REPRINTED FROM PC Week, March 04, 1986
|
||
Copyright (C) 1986 Ziff Davis Publishing Company
|
||
|
||
License and permission to reprint per terms of contract number
|
||
PCW2-198 dated March 13, 1986 have been granted to Ken Kaplan,
|
||
Executive Director, International FidoNet Association.
|
||
|
||
File-Compression Program Lowers User's
|
||
Connect Costs While Increasing Disk Space
|
||
|
||
By Garry Ray
|
||
|
||
|
||
One of the problems with PC disk files is they never stop coming.
|
||
The more floppies you have, the more you need. The larger your
|
||
hard disk, the smaller it seems to get. And it probably goes
|
||
without saying that adding a modem to any PC system at least
|
||
doubles the monthly telephone bill.
|
||
|
||
ARC, a unique utility program from System Enhancement Associates,
|
||
of Wayne, N.J., solves many of these problems. Originally
|
||
released in early 1985, the program has quickly become a standard
|
||
on the PC bulletin-board circuit, replacing other popular "public
|
||
domain" programs such as Squeeze (SQ), Unsqueeze (USQ) and
|
||
Library Utility 86 (LU86).
|
||
|
||
The primary function of all these utilities is to compress and
|
||
link disparate files into a single, smaller whole. The immediate
|
||
and most significant benefit passes to those who regularly
|
||
transfer files from one PC to another via telephone lines. With
|
||
ARC, you can lop off excessive telephone-connection charges by
|
||
converting, for example, 300K bytes of text files into a single
|
||
file of less than 160K bytes.
|
||
|
||
The result? A simple 1,200-bit-per-second file transfer between
|
||
the East and West coasts would cost about $7 less than otherwise
|
||
(based on AT&T day-rate charges). Do that just a few times and
|
||
you've paid for the program. A few more and you're making money.
|
||
|
||
Connect charges aren't the only things you'll save with ARC.
|
||
Floppy- and hard-disk space can be vastly increased by storing
|
||
like files in archives. It's fairly evident that converting that
|
||
same 300K bytes of files into a 160K-byte archive file will pay
|
||
off in two ways_better disk organization and more optimal use of
|
||
the storage device.
|
||
|
||
Using ARC is about as simple as anything could be. The program is
|
||
invoked from the DOS command line by typing "ARC," with a series
|
||
of command-line switches and file specifications determining the
|
||
action the program will take.
|
||
|
||
When invoked without any commands, ARC will merely display a
|
||
copyright notice and a command summary, and then return the user
|
||
to DOS. The command summary is the only "on-line help" the
|
||
program displays, though it certainly is sufficient, given the
|
||
simplicity of ARC.
|
||
Fidonews Page 15 21 Apr 1986
|
||
|
||
|
||
The most important program commands are Add, Move and Extract.
|
||
Like the rest of the ARC commands, these are invoked by typing
|
||
the first letter of the command on the DOS command line,
|
||
immediately after the command "ARC."
|
||
|
||
A typical command sequence might be "ARC A TEXT *.TXT," which
|
||
means "add to an archive file called `TEXT.ARC' all the files on
|
||
the current subdirectory and drive with the file-name extension
|
||
`.TXT'." The Move command, specified on the command line with
|
||
the letter "M," would simply delete all the desired files from
|
||
the DOS directory after they had been added to the archive file.
|
||
|
||
While it's creating and adding to archive files, ARC performs a
|
||
number of additional tricks. Every file is individually examined
|
||
to determine its type and structure, at which point ARC selects
|
||
one of three built-in file-compression techniques. The
|
||
compression algorithms are extremely complex, but suffice it to
|
||
say that text files are usually reduced in size by 40 to 60
|
||
percent, and binary files by anywhere from 15 to 35 percent.
|
||
|
||
Files can be added to an archive with no compression at all
|
||
(using the "suppress" command), and later packed and squeezed by
|
||
invoking the "convert" command switch.
|
||
|
||
Finally, the Extract command (invoked with either "x" or "e" on
|
||
the command line) is the tool that allows users to remove files
|
||
from the archive. Using the above example, the entire contents of
|
||
an archived file can be extracted to original form by typing "ARC
|
||
X TEXT," in which case all files are "uncompressed" and placed in
|
||
the current subdirectory as individual files.
|
||
|
||
Users can also use standard DOS file-specification commands to
|
||
select individual or groups of files for extraction. For
|
||
instance, all 1-2-3 worksheet files could be extracted by the
|
||
command "ARC X LOTUS *.WKS".
|
||
|
||
In any case, the original archive file retains all its original
|
||
contents, though unneeded files can be subsequently deleted with
|
||
the ARC "delete" command.
|
||
|
||
If you've forgotten which archive file contains what, two ARC
|
||
commands allow you to get either short or long archive
|
||
directories. The short listing displays the file name, length,
|
||
original file creation date, and the uncompressed length of each
|
||
file.
|
||
|
||
Inherent Verbosity
|
||
|
||
The long listing (available through the "verbose" command), shows
|
||
more detailed information, such as each file's compressed size,
|
||
the compression technique used, the creation date and time, and
|
||
the Cyclical Redundancy Check (CRC) value for each file. The CRC
|
||
value is used by ARC to determine the integrity of the file
|
||
during compression and extraction, though a user command, "test,"
|
||
also uses the CRC value for the same purpose.
|
||
|
||
Fidonews Page 16 21 Apr 1986
|
||
|
||
|
||
In addition to all the primary archiving and compression
|
||
commands, ARC allows the archived file contents to be either
|
||
viewed, printed or even executed with the "run" and "print"
|
||
commands. Run does exactly that -- it runs the .COM, .EXE, .BAT
|
||
or .BAS file specified on the ARC command line.
|
||
|
||
This did not seem to us a highly useful command, since the
|
||
processing overhead required by ARC just didn't seem to be worth
|
||
the trouble. Instead, it seems easier just to "unarchive" the
|
||
appropriate file and run it in the normal manner. Additionally,
|
||
the "run" command does not accept command-line parameters for the
|
||
program being invoked.
|
||
|
||
Last but not least is ARC's "garble" command, which allows the
|
||
user to encrypt files as they are added to the archive. A user-
|
||
supplied password of any length can be used for encryption and
|
||
must be subsequently supplied for any other ARC operation
|
||
regarding the file(s).
|
||
|
||
Excellent Support
|
||
|
||
System Enhancement Associates' technical support for ARC is
|
||
outstanding. The program is regularly updated to incorporate new
|
||
features, or to repair bugs that may have entered into previous
|
||
versions. A $50 maintainance fee provides five annual update
|
||
disks.
|
||
|
||
Program documentation, license policies and revision histories
|
||
are included in a DOS text file distributed with the program in
|
||
ARC format. Those who purchase ARC directly from the developer
|
||
also receive a number of "free" utility programs and the source
|
||
code (in both C and 8086 assembler) for all programs.
|
||
|
||
In sum, ARC is a fairly sophisticated and eminently useful
|
||
product for which savvy users will find a number of applications.
|
||
The fact that it is distributed as a "shareware" program and that
|
||
reasonable site licenses are available makes this a good
|
||
candidate for at least a trial run.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 17 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
WANTED
|
||
=================================================================
|
||
|
||
HELP WANTED
|
||
REGION 19 TEXARKANA COORDINATOR
|
||
|
||
We are now looking for a Fido sysop to assume the position as
|
||
Region 19 Coordinator supporting the states of Oklahoma, Texas,
|
||
Arkansas, and Louisiana. This person will be responsible for all
|
||
of the duties of a Region Coordinator as described in the current
|
||
POLICY1.DOC. This sysop must have adequate time to devote to
|
||
supporting Region 19.
|
||
|
||
This Fido will be the first to receive the NODEDIFF.Ann,
|
||
FidoNews, etc. and will be expected to make them available to the
|
||
other Networks in Region 19. This Fido will be responsible for
|
||
taking applications for and encouraging the formation of new Nets
|
||
in Region 19. This Fido will be expected to resolve disputes in
|
||
Region 19 so she/he must be a good problem solver.
|
||
|
||
We would prefer someone with a 2400 baud modem, and that has been
|
||
up and running for no less than three months. We will accept
|
||
applicants from any node within the Region 19 area. Please do
|
||
NOT apply if you are already a Net coordinator.
|
||
|
||
Please submit your qualifications, including a paragraph on why
|
||
you think you would do a good job as the Region 19 Coordinator,
|
||
to Ken Kaplan at Fido 1/0.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 18 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
FOR SALE
|
||
=================================================================
|
||
|
||
ENTERTAINMENT SOFTWARE FOR YOUR PC!
|
||
|
||
SUPERDOTS! KALAH!
|
||
|
||
Professional quality games include PASCAL source! From the
|
||
author of KALAH Version 1.6, SuperDots, a variation of the
|
||
popular pencil/paper DOTS game, has MAGIC and HIDDEN DOT
|
||
options. KALAH 1.7 is an African strategy game requiring
|
||
skill to manipulate pegs around a playing board. Both games
|
||
use the ANSI Escape sequences provided with the ANSI.SYS
|
||
device driver for the IBM-PC, or built into the firmware on
|
||
the DEC Rainbow. Only $19.95 each or $39.95 for both
|
||
exciting games! Please specify version and disk format.
|
||
These games have been written in standard TURBO-PASCAL and
|
||
run on the IBM-PC, DEC Rainbow 100 (MSDOS and CPM), CPM/80,
|
||
CPM/86, and PDP-11. Other disk formats are available, but
|
||
minor customization may be required.
|
||
|
||
BSS Software
|
||
P.O. Box 3827
|
||
Cherry Hill, NJ 08034
|
||
|
||
|
||
For every order placed, a donation will be made to the Fido
|
||
coordinators! Also, if you have a previous version of KALAH
|
||
and send me a donation, a portion of that donation will also
|
||
be sent to the coordinators. When you place an order, BE
|
||
CERTAIN TO MENTION WHERE YOU SAW THE AD since it also
|
||
appears in PC Magazine and Digital Review.
|
||
|
||
Questions and comments can be sent to:
|
||
|
||
Brian Sietz at Fido 107/17
|
||
(609) 429-6630 300/1200/2400 baud
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 19 21 Apr 1986
|
||
|
||
|
||
Now available from Micro Consulting Associates!!
|
||
|
||
Public Domain collection - 300+ "ARC" archives - 10 megs of
|
||
software and other goodies, and that's "archived" size! When
|
||
unpacked, you get approximately 17 megabytes worth of all kinds
|
||
of software, from text editors to games to unprotection schemes
|
||
to communications programs, compilers, interpreters, etc...
|
||
|
||
This collection is the result of more than 10 months of intensive
|
||
downloads from just about 100 or more BBS's and other sources,
|
||
all of which have been examined, indexed and archived for your
|
||
convenience. Starting a Bulletin Board System? Want to add on
|
||
to your software base without spending thousands of dollars? This
|
||
is the answer!!!
|
||
|
||
To order the library, send $100 (personal or company check,
|
||
postal money order or company purchase order) to:
|
||
|
||
Micro Consulting Associates, Fido 103/511
|
||
Post Office Box 4296
|
||
200-1/2 E. Balboa Boulevard
|
||
Balboa, Ca. 92661-4296
|
||
|
||
Please allow 3 weeks for delivery of your order.
|
||
|
||
Note: No profit is made from the sale of the Public Domain
|
||
software in this collection. The price is applied entirely to
|
||
the cost of downloading the software over the phone lines,
|
||
running a BBS to receive file submissions, and inspecting,
|
||
cataloguing, archiving and maintaining the files. Obtaining this
|
||
software yourself through the use of a computer with a modem
|
||
using commercial phone access would cost you much more than what
|
||
we charge for the service...
|
||
|
||
Please specify what type of format you would like the disks to be
|
||
prepared on. The following choices are available:
|
||
|
||
IBM PC-DOS Backup utility
|
||
Zenith MS-DOS 2.11 Backup Utility
|
||
DSBackup
|
||
Fastback
|
||
Plain ol' files (add $50, though, it's a lot of
|
||
work and takes more diskettes...)
|
||
|
||
Add $30 if you want the library on 1.2 meg AT disks (more
|
||
expensive disks). There are no shipping or handling charges.
|
||
California residents add 6% tax.
|
||
|
||
For each sale, $10 will go to the FidoNet Administrators.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 20 21 Apr 1986
|
||
|
||
|
||
SEAdog Electronic Mail System
|
||
Special Offer for FidoNet Sysops
|
||
|
||
|
||
System Enhancement Associates, the makers of the popular ARC file
|
||
archive utility, are proud to announce the release of the SEAdog
|
||
electronic mail system.
|
||
|
||
SEAdog is a PC-based electronic mail system which is fully
|
||
FidoNet compatible. In addition to all the functionality of
|
||
FidoNet mail, SEAdog adds the following:
|
||
|
||
o User directory support, for automatic lookup of node numbers
|
||
|
||
o Return receipts
|
||
|
||
o Audit trails
|
||
|
||
o Message forwarding, with or without a retained copy
|
||
|
||
o Twenty four hour mail reception
|
||
|
||
o High priority mail for immediate delivery
|
||
|
||
o The ability to request files and updates of files from other
|
||
SEAdog systems.
|
||
|
||
o No route files needed!
|
||
|
||
o A full screen user interface that our beta test sites fell in
|
||
love with!
|
||
|
||
SEAdog is NOT a bulletin board system, but it can be used as a
|
||
"front end" for Fido (version 11q or later), allowing you to add
|
||
the full functionality of SEAdog to your existing system.
|
||
|
||
SEAdog normally sells for $100/node, but for a limited time only
|
||
we are offering SEAdog to registered FidoNet sysops for only $50!
|
||
Orders may be placed by sending a check or money order to:
|
||
|
||
System Enhancement Associates
|
||
21 New Street, Wayne NJ 07470
|
||
|
||
Or by calling (201) 473-5153 (VISA and MasterCard accepted).
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Fidonews Page 21 21 Apr 1986
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
27 Apr 1986
|
||
2 AM - Beginning if Daylight Savings Time; DO NOT change your
|
||
clock!
|
||
|
||
3 May 1986
|
||
FidoBaby's first birthday.
|
||
|
||
19 May 1986
|
||
Steve Lemke's next birthday.
|
||
|
||
24 Aug 1989
|
||
Voyager 2 passes Neptune.
|
||
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
Daylight Savings Time
|
||
|
||
This coming Sunday, the 27th of April, most of the country goes
|
||
on Daylight Savings Time. FidoNet does NOT observe Daylight
|
||
Savings Time, so do NOT advance your system clock.
|
||
|
||
If you want to advance your system clock anyway, then you must
|
||
also advance all of your mail events.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|