textfiles/bbs/FIDONET/FIDONEWS/fido0651.nws

1806 lines
82 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 6, Number 51 18 December 1989
+---------------------------------------------------------------+
| _ |
| / \ |
| /|oo \ |
| - FidoNews - (_| /_) |
| _`@/_ \ _ |
| International | | \ \\ |
| FidoNet Association | (*) | \ )) |
| Newsletter ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief: Vince Perriello
Editors Emeritii: Dale Lovell
Thom Henderson
Chief Procrastinator Emeritus: Tom Jennings
FidoNews is published weekly by the International FidoNet
Association as its official newsletter. You are encouraged to
submit articles for publication in FidoNews. Article submission
standards are contained in the file ARTSPEC.DOC, available from
node 1:1/1. 1:1/1 is a Continuous Mail system, available for
network mail 24 hours a day.
Copyright 1989 by the International FidoNet Association. All
rights reserved. Duplication and/or distribution permitted for
noncommercial purposes only. For use in other circumstances,
please contact IFNA at (314) 576-4067. IFNA may also be contacted
at PO Box 41143, St. Louis, MO 63141.
Fido and FidoNet are registered trademarks of Tom Jennings of
Fido Software, 164 Shipley Avenue, San Francisco, CA 94107 and
are used with permission.
We don't necessarily agree with the contents of every article
published here. Most of these materials are unsolicited. No
article submitted by a FidoNet SysOp will be rejected if it is
properly attributed and legally acceptable. We will publish
every responsible submission received.
Table of Contents
1. ARTICLES ................................................. 1
A Christmas Poem ......................................... 1
Anudder Christmas Poem ................................... 3
D'Bridge 1.30 Single-line / Press release ................ 4
Internetwork Gateway Policy .............................. 6
TosScan, The Ultimate FrontDoor Echomail Processor ....... 23
Algorithm, The Personal Programming Newsletter ........... 27
2. COLUMNS .................................................. 28
From The Node At The End Of The Universe ................. 28
3. LATEST VERSIONS .......................................... 31
Latest Software Versions ................................. 31
And more!
FidoNews 6-51 Page 1 18 Dec 1989
=================================================================
ARTICLES
=================================================================
A Christmas Poem
----------------
Twas the night before Christmas, and all through the shop,
The computers were whirring; they never do stop.
The power was on and the temperature right,
In hopes that the input would feed back that night.
The system was ready, the program was coded,
And memory drums had been carefully loaded;
While adding a Christmasy glow to the scene,
The lights on the console flashed red, white, and green.
When out in the hall there arose such a clatter,
The programmer ran out to see what was the matter.
Away to the hallway he flew like a flash,
Forgetting his key in his curious dash.
He stood in the hallway and looked all about,
When the door slammed behind him,and he was locked out.
Then, in the computer room, what should appear,
But a miniature sleigh and eight tiny reindeer;
And a little old man, who with scarcely a pause, Chuckled:
"My name is Santa... the last name is Claus."
The computer was startled, confused by the name,
Then it buzzed as it heard the old fellow exclaim:
"This is Dasher and Dancer and Prancer and Vixen,
And Comet and Cupid and Donner and Blitzen."
With all these odd names, it was puzzled anew;
It hummed and it clanked, and a main ciruit blew.
It searched in its memory core, trying to "think";
Then the multi-line printer went out on the blink.
Unable to do its electronic job,
It said in a voice that was almost a sob:
"Your eyes--how they twinkle--your dimples so merry,
Your cheeks so like roses, your nose like a cherry,
Your smile--all these things, I've been programmed to know,
And at data-recall, I am more than so-so;
But your name and your address (computers can't lie),
Are things that I just cannot identify.
You've a jolly old face and a little round belly,
That shakes when you laugh like a bowlful of jelly;
My scanners can see you, but still I insist,
Since you're not in my program, you cannot exist!'
FidoNews 6-51 Page 2 18 Dec 1989
Old Santa just chuckled a merry "ho,ho,"
And sat down to type out a quick word or so.
The keyboard clack-clattered, its sound sharp and clean,
As Santa fed this "data" into the machine:
"Kids everywhere know me; I come every year;
The presents I bring add to everyone's cheer;
But you won't get a thing-- that's plain to see;
Too bad your programmers forgot about me."
Then he faced the machine and said with a shrug,
"Happy Christmas to all," as he pulled out its plug.
Submitted by Phil Buonomo 1:107/583@FidoNet, 520/583@AlterNet
-----------------------------------------------------------------
FidoNews 6-51 Page 3 18 Dec 1989
THE NIGHT BEFORE BETA TEST
'Twas the night before beta test, and all through the house,
not a program was working not even a browse.
The programmers hung by their tubes in despair,
with hopes that a miracle soon would be there.
The users were nestled all snug in their beds,
while visions of inquiries danced in their heads.
When out in the machine room there arose such a clatter,
I sprang from my desk to see what was the matter.
And, what to my wondering eyes should appear,
but a super-programmer (with a six-pack of beer.)
His resume glowed with experience so rare,
he turned out great code with a bit-pusher flair.
More rapid than eagles, his programs they came,
and he cursed and muttered and called them by name:
On update On add On inquiry On delete
On batch jobs On closing On functions complete.
His eyes were glazed over, fingers nimble and lean,
from weekends and nights in front of a screen.
A wink of his eye, and a twitch of his head,
soon gave me to know I had nothing to dread.
He spoke not a word, but went straight to his work,
turning specs into code, and then turned with a jerk.
And laying his finger upon the "ENTER" key,
he brought it all up and it worked perfectly.
The updates updated; the deletes, they deleted;
the inquiries inquired; and the closings completed.
He tested each whistle, he tested each bell,
with nary an a bug, all had gone well.
The system was finished, the tests were concluded,
the users' last changes were even included.
Yet the users exclaimed with a snarl and a taunt,
"It's just what we asked for but NOT what we want."
-- arthur bozlee
Submitted by Phil Buonomo 1:107/583@FidoNet, 520/583@AlterNet
-----------------------------------------------------------------
FidoNews 6-51 Page 4 18 Dec 1989
D'Bridge Software, 1:18/68
15 December 1989
Fidonet EMAIL users:
This is just a note to let you know that the 1.30 Single-line
version of D'Bridge has been released. It may be obtained via
many distribution sources and is available for download or
WaZOO-style file-request from 1:18/68, 1:105/3 and 1:273/905.
There's no sense in wasting Fidonews space with technical
details. Just try it; you'll like it. It's unlike any mailer
you've seen before... PLEASE KEEP IN MIND THAT D'BRIDGE IS
A COMMERICIAL PRODUCT.
Request: DBRIDGE or DB130*.* for the full distribution package.
These files total 778,678 bytes and take about 13-14
minutes with an HST. (You've been warned!)
DB130A.ZIP DBRIDGE0.130 D'Bridge installation control file
DBRIDGE1.130 D'Bridge (1 of 7)
ORDER-DB.TXT D'Bridge Order form
USA-EAST.COS Example cost file
MODEMS.SEL Modem default file
READ.ME This document
DB130B.ZIP DBRIDGE2.130 D'Bridge (2 of 7)
DBRIDGE3.130 D'Bridge (3 of 7)
DBRIDGE4.130 D'Bridge (4 of 7)
DBRIDGE5.130 D'Bridge (5 of 7)
DBRIDGE6.130 D'Bridge (6 of 7)
DBRIDGE7.130 D'Bridge (7 of 7)
X00.SYS FOSSIL driver courtesy of Ray Gwinn
X00.DOC Documentation for X00.SYS
DB130INS.ZIP INSTALL.EXE D'Bridge installation program
INSTALL.DOC Simple instructions INSTALL.EXE
DB130DOC.ZIP DBRIDGE.DOC D'Bridge User's Guide
DB130UPG.ZIP UPGRADE.DOC D'Bridge Upgrade Guide
Chris Irwin, 305-232-5245 Technical support
D'Bridge Software 800-762-4197 Credit card orders
Suite 208 305-255-6460 FAX
15321 South Dixie Highway 305-232-9365 EMAIL, 1:18/68
Miami, FL 33176
FidoNews 6-51 Page 5 18 Dec 1989
-----------------------------------------------------------------
FidoNews 6-51 Page 6 18 Dec 1989
Tim Pearson - 1:286/703
-----------------------
Introduction
============
I expect that many in FidoNet will view the draft of the
Internetwork Gateway Policy document published in this issue with
some puzzlement. Some will not have more than a cursory
awareness that Other Networks even exist. Others will,
initially, not understand why the current tendency of most other
FidoNet Technology Networks (FTNs) to "grab a zone and go" is
causing technical and administrative difficulties within FidoNet.
Many may be under the quite mistaken impression that FidoNet
somehow sanctions or assigns zone numbers to other FTN networks.
Very few will be aware that FidoNet currently exchanges net and
echomail traffic with networks whose technology and addressing
scheme is not that of FidoNet. Most folks, quite rightly,
believe in the old maxim: "If it ain't broke, don't fix it." In
this article, I will try to explain why most current internetwork
communication methods are broken and why we feel that this
document will at least lay the groundwork for correcting the
problems that currently exist.
Why Zones Don't Work
--------------------
Those who designed the addressing scheme used within FidoNet
intended that zones be used to denote large geographic areas of
the world. The zonegate concept was developed to facilitate
economical and flexible interzone communication.
Zonegates provide economy by concentrating interzone
messages at the zonegate; allowing many messages to be combined
and compressed before they make the expensive "jump" to the other
zone.
Zonegates provide addressing flexibility by allowing net and
node numbers to be duplicated across zones. For example, all
FidoNet zones may contain a net 123 or a node 123/456. This
allows each zone coordinator a substantial amount of freedom in
how they set up the zone's addressing scheme.
Zonegate technology specifically does not, however, provide
the functionality necessary to run a proper network to network
gateway. The inherent design assumes too much. It assumes that
the zonegate's FidoNet address will be something that it will not
be in the case of a network gateway. It assumes that there is
only one "zone" for any given zone number. It assumes that the
"from" Zone:Net/Node of the message need not be modified. None
of these things may be properly assumed in the network gateway
scenario. The result of attempts to make zonegate technology
serve in a network gateway role is that both FidoNet and the
other network are plagued with invalid, unknown addresses. The
problem is compounded when more than one other network attempts
to use the same illicit zone number. Private netmail replies to
FidoNews 6-51 Page 7 18 Dec 1989
echomail messages (one of the basic tenets of FidoNet) become
impossible.
The problem is further aggravated when users on a network to
which FidoNet is properly gated (UUCP / Internet for example)
attempt to reply to a message containing one of these illicit
zone numbers. The message arrives at the FidoNet / Internet
gate. Automatic forwarding from that point becomes impossible
since the "to" address is not a valid FidoNet address. Usually,
the FidoNet gateway sysop has no idea where to manually forward
the message.
What Will Work
--------------
The solution to this growing problem is to require that
messages, while in FidoNet, contain only valid FidoNet addresses.
Period. A proper gateway will make all messages emanating from
it into FidoNet appear technically as if they originated from the
gate's FidoNet address just as if a user on that FidoNet system
had entered the message. If an "other network" address is to
appear in the message, it must appear elsewhere (in a location
not relied upon by FidoNet mailer software for routing, duplicate
checking, etc.), such as in the message body. With that
accomplished, the technical problems disappear with the sole
exception being the education of the users in both networks as to
how and where to place the other network's address before sending
the message to the gate. Several techniques have been
considered.
The imposition of a standard method is beyond the scope of
this group's mandate. That will be left to the FTSC, and the
software developers. It is our sincere hope that a standard
method will be put forth in the near future. Otherwise, users
will have to remember multiple methods of gateway addressing
depending upon which network the message is ultimately destined
for.
Administrative Objectives
-------------------------
Another problem with the "grab a zone and go" method of
internetwork connectivity arises when the question of
accountability arises. Who is this other network whose
zone:net/node addresses are now appearing in FidoNet echoes? Who
does FidoNet contact in the event that technical or policy
related problems occur? Who does an echo moderator contact to
resolve a problem with an unruly user in the other net? Who does
a FidoNet coordinator contact in the event that a policy
complaint is filed upon a user or sysop in the other net? In
most cases for most networks the current answer to the above
questions is "I don't know."
FidoNews 6-51 Page 8 18 Dec 1989
We submit that this is no way to run a railroad. It is this
series of problems that the "Administrative Agreement and
Registration" portion of the Gateway document was developed to
address. Some person in the other net needs to come forward and
say "Me. I'm the guy (or gal). Here's my address and voice /
data phone numbers. If you have problems with or questions about
this network or its gateways, FidoNet, call me. I'll take care
of it. By the way, here are the names and numbers of a few other
highly placed persons in this net. If you can't reach me, call
them. They will be able to assist you too." On its part, we
propose that FidoNet create the position of Internetwork
Coordinator to provide just that service to other nets that may
have problems with or questions of FidoNet.
The question of accountability can be simply and elegantly
addressed if we simply choose to view each "other network" as a
large "point" network under the control of the "responsible
party" named in the administrative agreement with the other
network. Just as the "bossnode" is responsible for the actions
of his "point" systems, the "responsible party" is responsible
for the actions of the sysops and users in the other network with
respect to FidoNet policy compliance.
In the event of a problem, FidoNet can work with the
"responsible party" or their authorized agent to resolve the
matter. If the matter cannot be resolved in any other fashion,
FidoNet reserves the right to simply cease gateway activities.
FidoNet makes no attempt to dictate what policy users in any
other network adopt or operate under. It simply requires that if
a message is to travel into FidoNet, it will be measured by the
same policy yardstick as any other FidoNet message or it will not
travel here at all.
Summary
-------
Your comments are invited. Many individuals have spent many
months in the development and refinement of the draft you see
here. In that situation, we may have taken for granted something
that the wording of the document really doesn't make clear. A
policy is nothing unless it can be clearly understood and
applied. If something seems unclear or ambiguous, please call it
to our attention. It is our intention to allow 30 days for the
receipt of input from the network at large. After that, the
final draft will be presented to the International Coordinator
for adoption. When that occurs, an article containing the final
text along with information on how to contact the Internetwork
Coordinator for an application will be published.
Members of the Gateway Policy Development Committee include:
Bill Bolton, Steve Bonine, Randy Bush, David Dodell, Rick Moore,
Tim Pearson, Vince Perriello, Tim Pozar, and Matt Whelan.
Netmailed comments to any of the above individuals will be shared
with the entire group at your request.
FidoNews 6-51 Page 9 18 Dec 1989
The Draft Internetwork Gateway Policy document follows:
+-----------------------------------------+
| FidoNet(tm) Internetwork Gateway Policy |
| |
| Draft 1.8 |
| |
| December 14, 1989 |
+-----------------------------------------+
Section 1 - Purpose
===================
This document sets forth the administrative policy
requirements for interconnection between the FidoNet amateur
international electronic mail network and other electronic mail
networks.
As an amateur network, membership in FidoNet is open and
available to any individual or group capable of meeting the
technical challenge and willing to participate constructively
within the technical and administrative guidelines employed
within FidoNet. FidoNet desires to extend this idea, "The free
exchange of information," to include other electronic mail
networks. While connectivity with other networks can be
beneficial to all parties involved, it cannot be expected to
operate smoothly unless the parties involved understand and agree
to observe technical and administrative guidelines designed to
promote the orderly flow of traffic between networks and to
provide a mechanism for problem resolution should problems arise.
This document intends to address those points.
Section 2 - Definitions
=======================
"FidoNet"
---------
An amateur electronic mail wide area network consisting of
several thousand computer systems world wide. Most of these
systems operate electronic bulletin board (BBS) software giving
each system the capability to provide electronic mail services to
up to several hundred users. Detailed information on the
technical and organizational aspects of the FidoNet mail network
is beyond the scope of this document. Further information can be
obtained from various FidoNet publications including the FidoNet
official policy document.
FidoNews 6-51 Page 10 18 Dec 1989
"Other Network"
---------------
The term "Other Network" will be used in this document as a
shorthand term referring to any other electronic mail network,
whether inherently compatible with the technology employed within
FidoNet or not. This term will often be used to refer
specifically to the electronic mail network making application to
FidoNet for a "Gateway" (defined below).
"Gateway"
---------
A gateway is a system of computers equipped with the
hardware and software necessary to pass electronic mail messages
(possibly of various types, see below) between FidoNet and a
specific Other Network. A Gateway acts as a translator, allowing
messages entered on a system in the Other Network and addressed
to a destination within FidoNet to be translated into a form that
is technically acceptable to and compatible with FidoNet and vice
versa. All messages originated in the Other Network and
addressed to a destination within FidoNet are first routed to a
Gateway.
At a Gateway, the message is made technically acceptable to
and compatible with FidoNet and forwarded into FidoNet's wide
area network for delivery to its final destination. A message
originated within FidoNet and addressed to a destination within
the Other Network is handled in a similar manner.
"Netmail"
---------
The term Netmail, as used within FidoNet, refers to an
electronic mail message that is addressed to a specific physical
destination. Netmail messages can be addressed to a particular
individual at the destination site. Public messages can be read
by users other than the named addressee while private messages
cannot typically be read by any user other than the named
addressee and the system administrator/operator at the
destination site. Further information on Netmail is available in
other FidoNet technical and policy documents.
"Conference Mail"
-----------------
Echomail is the term used within FidoNet to refer to
electronic "Conference Mail" messages that, while possibly
containing the name of a particular individual in the "To:"
field, are copied and distributed to multiple (possibly several
hundred) destination systems. Some Other Networks refer to their
analogous capability under the terms "GroupMail" or "newsgroup".
Echomail messages are segregated into "Conferences" based upon
the topic being discussed. Echomail message content is usually
restricted to the topic(s) for which the particular conference
was created. Several hundred Echomail conferences exist within
FidoNet dedicated to topics ranging from technical discussions of
FidoNews 6-51 Page 11 18 Dec 1989
various computer systems and peripherals to philosophy and
religion. Further information on Echomail can be obtained by
consulting other FidoNet technical and policy documents.
"FidoNet Technology Network" (FTN)
----------------------------------
For the purposes of this document, a "FidoNet Technology
Network" (FTN) shall be defined as an Other Network whose message
format and transmission protocols strictly meet the technical
requirements set forth by the FidoNet Technical Standards
Committee (FTSC). FidoNet Technology Networks are inherently
technically compatible with FidoNet. Connectivity options are
available to FTN's that are not (for technical reasons) available
to non-FTN Other Networks.
Internetwork Coordinator (INC)
------------------------------
The Internetwork Coordinator is the individual within
FidoNet who has the responsibility for overseeing the granting,
installation, and maintenance of FidoNet to Other Network
Gateways. The INC shall be designated by and act as the agent of
the FidoNet International Coordinator.
Multi-Network (MultiNet)
------------------------
A "multinet" is a type of "super" network whose function is
to provide connectivity between many other networks and to allow
bidirectional communication between these networks.
Duplicate Message
-----------------
Because of the technology employed by some FidoNet
Conference Mail distribution systems, improper routing
information or topology can cause multiple copies of the same
message text to be delivered to FidoNet systems. A duplicate
message is defined as any message arriving at a FidoNet node
whose message body (the text entered by the human originator of
the message) is identical to the message body of a previously
received message. Messages manually forwarded to another
recipient are not considered duplicates for the purposes of this
document.
Section 3 - Administrative Guidelines
=====================================
This section is intended to outline the administrative
framework under which Other Networks may connect to FidoNet.
FidoNet reserves the right to reject any Other Network Gateway
application for any reason.
FidoNews 6-51 Page 12 18 Dec 1989
3.1 - Other Network Connectivity to FidoNet Through "MultiNets"
---------------------------------------------------------------
FidoNet may elect to seek and obtain connectivity to various
multinet host facilities for the purposes of communicating with a
wide range of Other Networks. Any Other Network that desires to
communicate with FidoNet may elect to facilitate such
communication via the multinet. However, FidoNet reserves the
right to refuse to deliver incoming message traffic arriving via
such an arrangement based upon the guidelines set forth in this
document.
An Example:
FidoNet is now gated into Internet via UUCP. It has agreed
to the terms and conditions necessary for membership in and
connectivity to the Internet multi-network "umbrella". One
obvious method for achieving connectivity to FidoNet (and a whole
host of other wide area networks) is for the Other Network to
apply to Internet for a gateway. Under this scenario, the Other
Network is bound by the terms and conditions of Internet just as
FidoNet is. In this peer relationship, the terms and conditions
stated in this document are used by FidoNet to determine if Other
Network message traffic arriving at a FidoNet/Internet gateway
will be accepted into FidoNet.
3.2 - Connectivity Only Through Mutually Recognized Gateways
------------------------------------------------------------
While FidoNet has no desire to inhibit experimentation or
connectivity between consenting systems it must maintain the
technical and administrative integrity of its network.
Henceforth, FidoNet will not permit non-FidoNet addresses to
appear in any addressing or routing control fields (Some current
examples include: the "From" or "To" address fields, the "*
Origin" lines, the "seen-by" fields, and the "^APath" fields.) of
any netmail or echomail messages traveling on any portion of
FidoNet's wide area network. This restriction applies to all
present and future FidoNet nodes. FidoNet nodes who wish to
participate in Other Networks may do so but must insure that all
message traffic transmitted to other FidoNet systems contain only
valid FidoNet addresses in the addressing and routing control
fields. The FidoNet coordinators will enforce this requirement
and are authorized by the International Coordinator to take
whatever action may be necessary to prevent non-FidoNet addresses
from entering Fidonet, including without limitation, referring
the offending nodes to this document and to the InterNetwork
Coordinator for information on how to establish proper Gateways.
The sole exception to this requirement is set forth in the
following paragraph:
FidoNews 6-51 Page 13 18 Dec 1989
The exchange of message traffic, on an experimental or
private and closely controlled basis, between an Other Network
and a system or systems that happen to be members of FidoNet is
permitted and encouraged if such message traffic is confined to
the consenting FidoNet systems and is not allowed to travel on or
to any portion of FidoNet's wide area network that has not
previously consented to carry such traffic and if such
connectivity does not prohibit the FidoNet system(s) from
fulfilling the technical and policy requirements necessary for
membership in FidoNet. FidoNet requests that the INC be informed
of such arrangements so that any unintentional "leakage" of Other
Network message traffic into FidoNet's wide area network may be
rapidly isolated and corrected.
The exchange of message traffic between any Other Network
and FidoNet on any basis other than the one mentioned in the
paragraph above shall only be done through mutually recognized
and proper Gateways meeting the requirements set forth in this
document.
3.3 - Administrative Agreement and Registration
-----------------------------------------------
FidoNet requires that an Administrative agreement be
executed by and between the individual(s) responsible for the
administration of the Other Network and the FidoNet International
Coordinator, or the IC's authorized agent. This agreement should
outline, at a minimum, the following items:
1 - The name of the organization.
2 - The name, address, and voice telephone number
where the administrator of the Other Network may
be reached. (Administrative contact and responsi-
ble party).
3 - A brief description of the organization.
4 - The name, address and voice telephone number where
the individual(s) responsible for the operation of
the FidoNet/Other Network Gateway(s) may be
reached. (Technical Contact(s))
5 - A list of computer system(s) requesting Gateway
status containing the following information:
o The name of the gateway system as it will
appear in the FidoNet nodelist.
o The Locality, State / Province / Department /
etc., and Country where the Gateway is
FidoNews 6-51 Page 14 18 Dec 1989
physically located.
o The name of the system administrator for the
particular Gateway.
o The complete data telephone number for the
Gateway, including country code.
o The maximum baud rate supported by the Gate-
way and all modem standards supported.
o The hours during which the Gateway will
support FidoNet dial up mail sessions. (*SEE
NOTE BELOW*)
o The date the Gateway is expected to become
operational.
o The FidoNet compatible session protocol(s)
supported
o If the Gateway is now a member of FidoNet,
the zone, net, and node number of the FidoNet
system applying for Gateway status.
NOTE: For a system to be granted Gateway status, it
must at least be available for FidoNet dial
up mail sessions during the FidoNet dedicated
mail period for the geographic locality
concerned. FidoNet calls its mandatory
dedicated mail period the "Zone Mail Hour".
The time for "Zone Mail Hour" varies through-
out the world and can be found in Appendix A
of the current FidoNet Policy Document.
6. A clearly worded statement indicating that the
responsible party in the Other Network and Fido-
Net agree to the terms and conditions set forth in
the Administrative Agreement and those in this
document (included by reference as a part of the
agreement).
3.4 - Application of FidoNet Administrative Policy
--------------------------------------------------
For the purposes of applying FidoNet policy, FidoNet will
view the entire Other Network as a single FidoNet "node" under
the control of the individual named as the "Administrative
Contact / Responsible Party" (or an authorized agent thereof) in
the administrative agreement outlined in paragraph 3.3 above.
All other systems and their users will be viewed by FidoNet as
users on the "responsible party's" node for the purposes of
FidoNet official policy application.
FidoNews 6-51 Page 15 18 Dec 1989
FidoNet holds the operator of a FidoNet node responsible
(from an administrative policy standpoint) for the actions of
that node's users, subordinate "point" systems, and the "point"
system's users. FidoNet views single or multiple Other Network
Gateways as a single "boss" node under the control of the
"responsible party" and will apply FidoNet official policy
accordingly. FidoNet reserves the right to sever links to one or
more of the Other Network's Gateways as its final remedy for
violations of administrative policy. (see the paragraph titled
"Points" in the "Overview" section and the paragraph titled
"Responsible for All Traffic Entering FidoNet Via the Node" in
the "Sysop Procedures" section of FidoNet's official policy
document, for further information).
3.5 - Supported Message Types
-----------------------------
FidoNet will grant Gateway interconnection for the purposes
of exchanging messages of the type defined above as "Netmail" and
optionally for the purposes of exchanging messages of the type
defined above as "Echomail". FidoNet will not grant Gateway
interconnection for the purposes of exchanging "Echomail" only.
The ability to generate a private and personal "Netmail" reply to
an "Echomail" message is one of the basic facets of FidoNet and
cannot be compromised.
3.6 - Acceptance Criteria (All Other Networks)
----------------------------------------------
The granting of Other Network Gateways into FidoNet is not
automatic nor is it based solely on the Other Network's ability
to demonstrate technical compliance with the objectives set forth
in section 4 below. Some other criteria include:
o The Other Network should have an individual will-
ing and able to carry out the role of "Responsible
Party" as defined herein. The Other Network
"administration" should be willing to help in
assuring that technical, social, and administra-
tive policy standards are consistently met in all
message traffic emanating from the Gateway(s).
FidoNet pledges to do likewise.
o The Other Network must have demonstrable stabili-
ty. It should have been in operation as a free
standing network for a period of time sufficient
to prove its reliability. It should be able to
prove that it has the technical and administrative
expertise to maintain and regulate reliable Gate-
ways over an extended period of time.
FidoNews 6-51 Page 16 18 Dec 1989
3.7 - Other Criteria (FTN Other Networks)
-----------------------------------------
Software allowing nodes in FTN Other Networks to
simultaneously participate directly in FidoNet as valid FidoNet
nodes, isolating the Other Network's addresses from FidoNet
message traffic (i.e., using only valid FidoNet addresses in
FidoNet message traffic) presently exists. This "dual identity"
approach is the method FidoNet expects nodes in the FTN Other
Network will employ. Such an approach:
o Eliminates the need for any written agreement
between FidoNet and the FTN Other Network since
each Other Network node simply participates in
FidoNet, using only valid FidoNet addresses, in a
manner indistinguishable from a FidoNet node that
does not belong to any Other Network.
o Allows for FidoNet connectivity on a node by node
basis.
o Speeds mail transfer since message traffic can
enter FidoNet's wide area network at the point of
origin rather than having to first pass through a
Gateway.
o Eliminates the costly situation where an Other
Network node wanting to communicate with a FidoNet
node (or vice versa) in the same local calling
area must first route the message through a dis-
tant Gateway, incurring unnecessary expense to
himself, the Other Network and FidoNet.
o Gives each node contact with a nearby FidoNet
coordinator to provide FidoNet services more
effectively.
o Greatly reduces the effort involved to connect
into FidoNet. Each node simply sends a Netmail
message to the nearest FidoNet coordinator listing
the pertinent information for the system and
requesting that a FidoNet node number be granted.
o Eliminates any possible administrative policy
conflicts between the FTN Other Network and Fido-
Net. The node simply adheres to FidoNet policy in
FidoNet message traffic and to Other Network
policy in Other Network message traffic.
Given the above advantages, the FTN Other Network must
provide evidence of overriding technical or social
considerations, must show cause why these considerations justify
the establishment of a Gateway instead of merely allowing its
individual nodes to use the "dual identity" approach, and must
satisfy FidoNet that such an arrangement will be mutually
beneficial.
FidoNews 6-51 Page 17 18 Dec 1989
3.8 - Shared Echomail Conferences
---------------------------------
Echomail conferences shared between networks must be
registered with the appropriate FidoNet echomail coordinator. It
is the responsibility of the Other Network and its Echomail
source(s) within FidoNet to insure that proper topology is
observed between the FidoNet / Other Network Gateway(s) and that
duplicate echomail messages do not enter FidoNet. It cannot be
overemphasized that all message traffic emanating from a Gateway
must contain only valid FidoNet addresses in the message's
addressing and routing fields. Current examples include, without
limitation, the "from" and "to" addresses in the message header,
the *ORIGIN line address, the SEEN BY addresses and the ^APath
addresses.
3.9 - Network Integrity
-----------------------
In the event that FidoNet determines that significant harm
is being caused to the technical or social integrity of its
network, it may immediately sever links between the Other Network
Gateway(s) and FidoNet. FidoNet will make all reasonable
attempts to contact the "Responsible Party" as soon as possible
(before the severing of links if possible) to inform the Other
Network of the problem and to work toward its resolution.
Section 4 - Technical Objectives
================================
At this time, FidoNet has not published a detailed technical
standard for Gateways. FidoNet reserves the right to develop,
implement, and require adherence to such a standard at a future
date. In the mean time, the following general guidelines are set
forth for Other Networks that desire to communicate with FidoNet.
4.1 - Technical Standards within FidoNet
----------------------------------------
The FidoNet Technical Standards Committee (FTSC) has
developed and published technical standards for message packets
and mailer-to-mailer protocols. The Gateway system(s) must be
able to assemble and transmit FidoNet standard message packets
using FidoNet standard session protocol. A gateway must also be
able to receive and disassemble FidoNet standard message packets
using FidoNet standard session protocol. Translation from the
Other Network's internal message format to FidoNet standard
packets and vice versa is the responsibility of the Gateway.
4.2 - Logical Other Network Address
-----------------------------------
FidoNews 6-51 Page 18 18 Dec 1989
Software at a Gateway shall modify each message entering
FidoNet (whether Netmail or Echomail) such that FidoNet software
will interpret the logical address of origin of the message as
the Gateway's FidoNet address.
4.3 - Physical Other Network Address
------------------------------------
Software at a Gateway shall embed the Other Network address
(physical point of origin), in human readable form, at a
predictable location in the message body immediately preceded by
a predictable identifier such that software designed to
facilitate the automatic inclusion of this information in FidoNet
replies to Other Network messages will be able to glean this
information from the other text in the body of the message
reliably. This requirement applies to Other Network messages
entering FidoNet, both Netmail and Echomail.
4.4 - FidoNet to Other Network Addressing (Netmail)
---------------------------------------------------
FidoNet users must be provided with a procedure for routing
what FidoNet defines as "Netmail" to Other Network users via a
Gateway. FidoNet users will be instructed to address netmail to
Other Network users to the FidoNet Zone:Net/Node address for an
Other Network Gateway.
The exact method by which these messages are forwarded to
their final destination within the Other Network is left to the
discretion of the Other Network. One obvious method is to have
the FidoNet user enter the "physical Other Network address" in
the proper location preceded by the proper identifier as outlined
in paragraph 4.4 above. FidoNet will help the Other Network in
educating FidoNet users on the proper form and location of the
additional address information necessary to route a FidoNet to
Other Network message to its final destination automatically via
a Gateway. FidoNet netmail arriving at a Gateway with improper
Other Network addressing information must either be corrected and
forwarded to the proper Other Network address or returned to the
FidoNet sender with text inserted notifying the sender that the
message was undeliverable.
4.5 - Echomail Standards
------------------------
Echomail entering FidoNet shall conform to FidoNet (FTSC)
standard format. FidoNet control, routing, and addressing
information in each message shall show that it originated from
the Gateway's FidoNet address. Internal Other Network routing
information (if any) attached to echomail messages must be
removed at the Gateway with the exception being the "Physical
Other Network Address" as defined in paragraph 4.3 above.
FidoNews 6-51 Page 19 18 Dec 1989
Section 5 - Network Policy Implications
=======================================
5.1 - Interpretation
--------------------
FidoNet retains the exclusive right to interpret the terms
and conditions stated herein based upon its representatives' best
understanding of those terms and conditions and upon its
knowledge of the original intent of the authors.
Draft Administrative Agreement
This agreement made this ________ day of _________,
__________ between "FidoNet" and
__________________________________________________, hereinafter
referred to as "Other Network", shall be mutually exclusive and
binding upon the parties herein until rescinded or revised by
agreements of the parties, as defined and stated herein.
Article 1.
----------
Other Network and FidoNet desire to exchange electronic mail
between their respective networks. The parties do therefore
mutually covenant and agree as follows:
Article 2.
----------
The parties hereto agree that the FidoNet document titled
"Internetwork Gateway Policy" shall be controlling and is
incorporated as if referenced and set out in full.
Paragraph 2.1 - Internetwork Gateway Policy
-------------------------------------------
Other Network and FidoNet agree to be bound by the terms and
conditions set forth in the FidoNet document titled "Internetwork
Gateway Policy" included by reference in Article 1 above.
Paragraph 2.2 - Gateway Certification
-------------------------------------
FidoNet and Other Network agree not to exchange or attempt
to exchange electronic mail via the proposed Gateway system(s)
other than on a limited and mutually agreed "test" basis until
both parties certify that the Gateway(s) are open for general
message traffic.
FidoNews 6-51 Page 20 18 Dec 1989
Paragraph 2.3 - Registration Information
----------------------------------------
Other Network agrees to provide FidoNet with complete and
accurate information as requested in Articles 3 and 4 below and
with any other information FidoNet may deem necessary as a prior
condition for the certification of any FidoNet/Other Network
gateways.
Article 3 - General Information.
--------------------------------
Organization name :
_________________________________________
Administrative Contact/Responsible Party:
Name:___________________________________
Address:___________________________________
City:___________________________________
State/Province:___________________________________
Country:___________________________________
Voice Telephone:___________________________________
Other Network Address:___________________________________
Technical Contact:
Name:___________________________________
Address:___________________________________
City:___________________________________
State/Province:___________________________________
Country:___________________________________
Voice Telephone:___________________________________
Other Network Address:___________________________________
FidoNews 6-51 Page 21 18 Dec 1989
Brief Description of the Other Network Organization:
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________
Article 4 - Gateway Specific Information (duplicate if needed)
--------------------------------------------------------------
Gateway name as it is to appear in FidoNet nodelist:
____________________________________________________
Gateway System Administrator:
____________________________________________________
Physical Gateway Location:
Address:___________________________________
City:___________________________________
State/Province:___________________________________
Country:___________________________________
Voice Telephone:___________________________________
Gateway dial-up telephone number: _____________________________
Maximum asynchronous baud rate: ________________
Hours FidoNet dial-up mail sessions are supported (GMT):_______
Anticipated operational date: ____/____/____
FidoNet session protocols supported: __________________________
FidoNews 6-51 Page 22 18 Dec 1989
Is this system at present a FidoNet node? ___Yes ___No
If yes, Zone:_____ Net:______ Node:______
Article 5 - Termination
-----------------------
This agreement shall be terminated _______ days after the
giving of notice by either party at which point all Gateway
activities will cease.
Article 6 - Sole and Exclusive Agreement
----------------------------------------
This agreement is the sole and exclusive agreement between
the parties.
Article 7 - Remedies
--------------------
Both parties agree that their sole and exclusive remedy for
non compliance with the Internetwork Gateway Policy shall be to
terminate gateway activities.
For FidoNet:
By:___________________________________________
Title:___________________________________________
Date: ___________________
For Other Network:
By:___________________________________________
Title:___________________________________________
Date:____________________
-----------------------------------------------------------------
FidoNews 6-51 Page 23 18 Dec 1989
Mike Janke
1:135/4
TosScan - THE Echomail processor
Introduction:
-------------
The day many of you have been waiting for, and some thought would
never come, has finally arrived. Yes TosScan, the most awesome
echomail processor to ever hit the network, is finally available!
Let me just say that when one is coding such a full-featured pro-
gram, and when the integrity of billons of bytes of echomail is
at stake, it's best to make sure it is right rather than rush a
questionable version out the door.
As part of the beta test team, I can say that TosScan is rock
solid and ready to roll.
What it is
----------
Of course TosScan has all the usual features you'd expect of any
echomail toss/scan program, but there is much more!
o Full-screen, window-based setup/configuration program.
o Echo Area manager.
o Node manager.
o AreaMgr (similiar to AreaFix)
o Full point support.
o Full zone support.
o Message base utilities.
You'll never have to load your text editor to modify a areas file
or other control file every time a node or area is added to your
system. And, you won't have to keep that dog-eared copy of docs
nearby just to mutter... "Hmmmm, lets see, what was that command
line switch again?" as is often done with other processors.
Tsetup, the TosScan setup/configuration program, will make your
life much easier whether you are the last link or a major NEC.
All aspects of echomail areas/nodes and message base maintenance
are handled according to parameters defined in Tsetup.
I'd like to describe each individual feature, but to do so would
swell FidoNews to unmanageable proportions.
Flexibility is the keyword. ARCmail in all flavors, variable net
node number usage and ARCmail filenaming conventions just to name
a few. The list goes on and on, but as I said, there is just too
much for this article.
FidoNews 6-51 Page 24 18 Dec 1989
Reliability is one of TosScan's strong points. It can handle the
worst junk that programs such as Qecho can throw at it. TosScan
processes mangled packets and grunged archives with unbelievable
ease; I have yet to see it stumble over a single bundle.
I hear you saying "But is it fast?". Speed, of course, depends
on whether you have a screamer 386 or lowly 8088 with 80ms hard
drive. Here's an idea of what you can expect. Your times may be
slightly different.
System: 386/20, 28ms 1:1 drive, Dos 3.30 w/2MB disk cache.
Arcmail: 710 KB / 1999 messages, 6 down-link systems.
Time: 21 minutes
System: 386/20, 2 MB RAM running in page interleave, DOS 4.01,
28ms hard drive.
Arcmail: 377 KB *.pkt. About 1/2 of the conferences run in
passthrough, averaging of 2.5 links per conference.
Time: 1 minute, 40 seconds.
System: 6MHZ AT/286 Clone, 1 x Miniscribe 6085 72 meg voice
coil 28 ms, DOS 4.01, 1 meg RAM drive, 1 meg cache.
Arcmail: 1,273,367 bytes (.PKT), 9 down-link systems.
Time: 26 minutes
External utilities
------------------
TosScan comes with two external utility programs to help maintain
your message base. Reply chain linking, killing old messages or
keeping an area within a certain number of messages, renumbering,
and for QuickBBS systems, the fastest pack and reindex you have
seen.
Availability
------------
By now I hope you're saying "Ok ok, enough! Where do I get it?".
TosScan, as you may or may not know, is a commercial product. It
will not be available for download or file request. It can only
be purchased from the author.
The current special price, valid for 30 days from initial release
is:
$20.00 - for users of the commercial version of FrontDoor.
$30.00 - for users of the noncommercial version of FrontDoor.
Add $6.00 shipping and handling for all orders within the United
States, $10.00 for overseas orders.
FidoNews 6-51 Page 25 18 Dec 1989
Send your orders to:
InterZone Software, Inc.
161 Madeira Avenue, Suite 57
Coral Gables FL 33134
Please specify whether you want the QuickBBS version or MSG
version. If you need the opposite version at a later date, you
may obtain it for a minimal fee.
In closing
----------
TosScan is THE ultimate echomail processor for FrontDoor systems
and I'm 100% sure you'll be glad you waited. It works quite well
and has been filled with features suggested by dozens of beta
testers like myself.
Here's what a few of my fellow Beta testers have to say about
TosScan:
"FrontDoor and TosScan fit together seamlessly...They are sim-
ply the best network mailer and echomail processor available
today... FrontDoor and TosScan are also the software of choice
for point operation..."
--- Bob Beilstein, 1:260/335
"I used to run Binkley/Confmail/Opus, but I long lusted after the
flexibility of QuickBBS. But as an NEC and defacto MacList star
I needed a fast, reliable echomail processor. TosScanQ/286 lets
me run QuickBBS."
--- Eric Larson, 1:260/330
" ...TosScan has taken the `worry' out of processing a great
deal of mail. Easy to install, easy to maintain, but most im-
portant, it is the most *ACCURATE* mail processor I have seen."
--- Bruce Bodger, NEC Net-170
"TosScan has made it easy being a Hub by it's shear speed and
power...It's everything you ever wanted in a mail processor, all
rolled up in one powerful package."
--- Kelly Drown, 170/403
"All I can say about TosScan is that it's the _slickest_
tosser/scanner I've ever seen in my entire life. ...TosScan
was the best $30 investment I made, and may the IC strike me down
with excommunication if I don't tell the truth.."
--- Felix Kasza, 2:310/11
FidoNews 6-51 Page 26 18 Dec 1989
"I have found TosScan to be a professionally conceived, executed,
and supported product. It has provided me with a low cost and
simple solution to all of my echomail needs, with a high degree
of performance."
--- Mark Howard, 1:260/340
Every feature has been tried, misused, abused and mangled during
the long months of testing. The result is a top notch product by
an author that supports his products and is readily available to
answer his users' questions.
Try it. I know you will be glad you did.
Mike Janke, 1:135/4
-----------------------------------------------------------------
FidoNews 6-51 Page 27 18 Dec 1989
Algorithm, The Personal Programming Newsletter
by A.K. Dewdney
London, Ontario, Canada
A.K. Dewdney, Computer Recreations columnist with Scientific
American magazine, has launched a personal programming
newsletter, Algorithm. The new publications is aimed at amateur
and professional programmers alike. It extends the Computer
Recreations tradition of recreational and educational
programming projects: the Mandelbrot set, cellular automata,
chaos and dynamics, wierd machines, stellar simulation, puzzles
and many other topics.
The new publication carries seven features and will expand to
include more columns. Currently, it includes Algoletter, advice
from professionals; Easy Pieces, fascinating projects for
beginning programmers by Michael Ecker of Creative Computing
fame; Personal Programs, exercises for more advanced programmers
by Cliff Pickover, IBM's computer graphics wizard; Algopuzzles,
computer mid-benders by Dennis Shasha, author of The Puzzling
Adventures of Dr. Ecco; Algofact and Algofiction, invited
articles and stories from well-known scientists and authors. A
Bulletin Board advertises hosts of recreational products by
individuals and small companies.
Algorithm puts the "personal" back in "personal computing" by
encouraging you to develop your programming skills while
pursuing high adventure on the frontiers of science and
computing. Order a free exmination copy by writing Algorithm at
P.O. Box 29237, Westmount Postal Outlet, 785 Wonderland Road,
London, Ontario, Canada N6K 1M6.
-----------------------------------------------------------------
FidoNews 6-51 Page 28 18 Dec 1989
=================================================================
COLUMNS
=================================================================
The Node At the End Of The Universe
2:256/117
By Steve Townsley
Forget about uninterruptable power supplies this week the PSU
went bang on an AT in the office. Luckly we know a good
maintenance firm that happily trails the 170 miles from London
just to fix problems like exploding computers.
Now, like everyone else in the office, I thought that the AT
power supply had blown. Apparently I was wrong. Our peculiar
beast was not true blue and therefore didn't have an AT power
supply but a '286 power supply.
The intelligent amongst you may well ask, as I did, why a '286 is
different from an AT. Well it isn't really. It's some of the odd
bits that go into a 286 that are different from an AT. So while
we are all proud of the fact that we have a small footprint AT be
aware that a full AT power supply probably isn't in there.
So as well as blowing the fuse, fusing the network, and generally
destroying a computer we now have to wait for our maintenance man
to come back with a '286 power supply. A perfect fit for the
slimer AT!
When your AT blows up, which I hope it never will, you can save
yourself the error of ordering the wrong part by finding out
whether you have a '286 or a real AT power supply.
Graphics
One of the subjects that occasionally crosses my mind is
graphics. Not because I am some kind of expert but simply because
the various formats are beginning to gain my interest.
Like or not we are all heading towards graphics environments. The
happy existance of 7 bit ASCII is on its way out. In place we may
get variations of the Mac or something like Presentation Manager.
I know quite a few Swedes, Danes, Germans and so on that will be
pleased to see the end of 7 bit ASCII. In graphics mode all
foreign language character sets, symbols, mathematics and so on
become straightforward and unrestricted by the rather narrow
ASCII set. Even the British would like to see the pound sign
become more standardised across hardware and software.
FidoNews 6-51 Page 29 18 Dec 1989
On my Epson printer at work a pound sign is ASCII 35 - I
therefore lose the hash symbol. On my IBM proprinter the pound
sign is ASCII 156 which carefully sits in the middle of Epson's
italic character set. Finally there is yet another standard for
Hewlett Packard LaserJets.... ASCII 175 (a double chevron).
Daisy-wheel printers differ depending on which wheel you choose.
In Britain we are only trying to print one character outside the
American standard set. In Europe multiply the problem many times
over.
So in reality the acceptance of new graphics environments,
whether PC, Amiga or ST should be good news.
However I have to admit that something about these graphics
environments throws me. Not only do they seem so much slower than
my trusty, text based, PC-Write they also leave me with a feeling
of 'do not touch'. I cannot quite explain it but when I finish
this file I can type it to screen from a DOS prompt, copy it to a
printer, even send it down a telephone line. Something about a
graphics environment says that I will remove the simplicity of
the command line to be replaced by a corporate designed
leviathan.
Already the TLA's (Three Letter Abreviations) indicate that
graphics 'experts' are far worse than comms junkies. Who can tell
what a TIF, GIF or PCX file really is. How do I explain a user
friendly icon based environment in terms that the average citizen
might be enthusiastic about. Do I really have to buy a 386, 8
megabytes of memory, OS/2 Presentation Manager, Pagemaker and a
laser printer just to create a letterhead on my continuous
stationery.
I have to confess to being partly a technological rebel. If
someone could show how to include a letterhead from PC-Write on
my trusty dot-matrix printer I would be inclined to feel that
graphics have some place in my day to day computing. Wrestling
with Ventura to send out a designed invoice on continuous
stationery is hard work.
Having to create 3 separate printer drivers for 3 different
printers just to print a pound sign does not make me confident
that graphics will help. Abandoning 7 bit ASCII should help all
PC owners be more creative and help us foreigners with a
universal standard character set. However I have this suspicion
that maybe software developers are not going to make it that
easy.
Finally if you have a comment to make on anything I ramble on
about address it to 'The Node At The End Of Universe somewhere in
Zone 2' or shorthand 2:256/117. Yes I do have a Compuserve
address - but it's far to expensive to use from this corner of
the Galaxy.
FidoNews 6-51 Page 30 18 Dec 1989
VIA 0:0/0 <grin>
-----------------------------------------------------------------
FidoNews 6-51 Page 31 18 Dec 1989
=================================================================
LATEST VERSIONS
=================================================================
Latest Software Versions
MS-DOS Systems
--------------
Bulletin Board Software
Name Version Name Version Name Version
Fido 12q+ Phoenix 1.3 TBBS 2.1
Lynx 1.30 QuickBBS 2.61* TComm/TCommNet 3.4
Kitten 2.16 RBBS 17.2B TPBoard 6.0
Opus 1.03b+ RBBSmail 17.2 Wildcat! 2.10*
Network Node List Other
Mailers Version Utilities Version Utilities Version
BinkleyTerm 2.30 EditNL 4.00 ARC 6.02
D'Bridge 1.30* MakeNL 2.20 ARCA05 2.01
Dutchie 2.90C ParseList 1.30 ARCmail 2.0
FrontDoor 2.0 Prune 1.40 ConfMail 4.00
PRENM 1.47 SysNL 3.01* EMM 2.02
SEAdog 4.51b XlatList 2.90 Gmail 2.01
XlaxDiff 2.32 GROUP 2.16
XlaxNode 2.32 GUS 1.20M
LHARC 1.13
MSG 4.0
MSGED 1.99
PK[UN]ZIP 1.02*
QM 1.0
QSORT 4.03
StarLink 1.01
TCOMMail 2.2
TMail 1.12
TPBNetEd 3.2
UFGATE 1.03
XRS 3.0
ZmailQ 1.09
Macintosh
---------
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Red Ryder Host v2.1b3 Macpoint 0.91* MacArc 0.04
Mansion 7.12 Tabby 2.1 ArcMac 1.3
WWIV (Mac) 3.0 StuffIt 1.51
FidoNews 6-51 Page 32 18 Dec 1989
TImport 1.331
TExport 1.32
Timestamp 1.6
Tset 1.3
Timestart 1.1
Tally 1.1
Mehitabel 1.2
Archie 1.60
Jennifer 0.25b2g
Numberizer 1.5c
MessageEdit 1.0
Mantissa 1.0
PreStamp 2.01
R.PreStamp 2.01
Saphire 2.1t
Epistle II 1.01
Import 2.52
Export 2.54
Sundial 2.1
AreaFix 1.1
Probe 0.052
Terminator 1.1
TMM 4.0b
UNZIP 1.01*
Amiga
-----
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Paragon 2.00+* BinkleyTerm 1.00 AmigArc 0.23
TrapDoor 1.11 booz 1.01
WelMat 0.35* ConfMail 1.10
ChameleonEdit 0.10
Lharc 1.00*
ParseLst 1.30
PkAX 1.00
RMB 1.30
UNzip 0.86
Zoo 2.00
Atari ST
--------
Bulletin Board Software Network Mailer Other Utilities
Name Version Name Version Name Version
FIDO/FoReM Door 1.1* BinkleyTerm 1.03g ConfMail 1.00
Pandora BBS 2.41c* The BOX 1.10* ParseList 1.30
QuickBBS/ST 0.40* ARC 5.21
GS Point 0.61 TurboArc 1.1
FidoNews 6-51 Page 33 18 Dec 1989
LHARC 0.40
PKUNZIP 1.00
MSGED 1.96S
SRENUM 6.2
OMMM 1.40*
Timestop 1.00
+ Netmail capable (does not require additional mailer software)
* Recently changed
Utility authors: Please help keep this list up to date by
reporting new versions to 1:1/1. It is not our intent to list
all utilities here, only those which verge on necessity.
-----------------------------------------------------------------
FidoNews 6-51 Page 34 18 Dec 1989
=================================================================
NOTICES
=================================================================
The Interrupt Stack
22 Dec 1989
IFNA plebiscite results posted in NODELIST.356
30 Dec 1989
Telephone area codes (5, 3 and 0) are abolished in Hong Kong
1 Feb 1990
Deadline for IFNA Policy and Bylaws election
5 Jun 1990
David Dodell's 33rd Birthday
5 Oct 1990
21st Anniversary of "Monty Python's Flying Circus"
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1:1/1.
-----------------------------------------------------------------
FidoNews 6-51 Page 35 18 Dec 1989
OFFICERS OF THE INTERNATIONAL FIDONET ASSOCIATION
Thom Henderson 1:107/528 Chairman of the Board
Les Kooyman 1:204/501 President
Fabian Gordon 1:107/323 Vice President
Bill Bolton 3:3/0 Vice President-Technical Coordinator
Kris Veitch 1:147/30 Secretary
Kris Veitch 1:147/30 Treasurer
IFNA COMMITTEE AND BOARD CHAIRS
Administration and Finance *
By-laws and Rules John Roberts 1:385/49
Executive Committee (Pres) Les Kooyman 1:204/501
International Affairs *
Membership Services Jim Vaughan 1:226/300
Nominations and Elections Steve Bonine 1:1/0
Public Affairs David Drexler 1:147/30.20
Publications Irene Henderson 1:107/9
Technical Standards Rick Moore 1:115/333
Ethics *
Security and Privacy *
Grievances *
* Position in abeyance pending reorganization
IFNA BOARD OF DIRECTORS
DIVISION AT-LARGE
10 Courtney Harris 1:102/732 Don Daniels 1:107/210
11 John Rafuse 1:12/900 Phil Buonomo 1:107/583
12 Bill Bolton 3:711/403 Mark Hawthorne 1:107/238
13 Fabian Gordon 1:107/323 Tom Jennings 1:125/111
14 Ken Kaplan 1:100/22 Irene Henderson 1:107/509
15 Kevin McNeil 1:128/45 Steve Jordan 1:206/2871
16 Ivan Schaffel 1:141/390 Robert Rudolph 1:261/628
17 Kathi Crockett 1:134/30 Dave Melnik 1:107/233
18 Andrew Adler 1:135/47 Jim Hruby 1:107/536
19 Kris Veitch 1:147/30 Burt Juda 1:107/528
2 Henk Wevers 2:500/1 Karl Schinke 1:107/516
3 Matt Whelan 3:54/99 John Roberts 1:147/14
-----------------------------------------------------------------
FidoNews 6-51 Page 36 18 Dec 1989
__
The World's First / \
BBS Network /|oo \
* FidoNet * (_| /_)
_`@/_ \ _
| | \ \\
| (*) | \ ))
______ |__U__| / \//
/ Fido \ _//|| _\ /
(________) (_/(_|(____/ (tm)
Membership for the International FidoNet Association
Membership in IFNA is open to any individual or organization that
pays a specified annual membership fee. IFNA serves the
international FidoNet-compatible electronic mail community to
increase worldwide communications.
Member Name _______________________________ Date _______________
Address _________________________________________________________
City ____________________________________________________________
State ________________________________ Zip _____________________
Country _________________________________________________________
Home Phone (Voice) ______________________________________________
Work Phone (Voice) ______________________________________________
Zone:Net/Node Number ____________________________________________
BBS Name ________________________________________________________
BBS Phone Number ________________________________________________
Baud Rates Supported ____________________________________________
Board Restrictions ______________________________________________
Your Special Interests __________________________________________
_________________________________________________________________
_________________________________________________________________
In what areas would you be willing to help in FidoNet? __________
_________________________________________________________________
_________________________________________________________________
Send this membership form and a check or money order for $25 in
US Funds to:
International FidoNet Association
PO Box 41143
St Louis, Missouri 63141
USA
Thank you for your membership! Your participation will help to
insure the future of FidoNet.
Please NOTE that IFNA is a general not-for-profit organization
and Articles of Association and By-Laws were adopted by the
membership in January 1987. The second elected Board of Directors
was filled in August 1988. The IFNA Echomail Conference has been
established on FidoNet to assist the Board. We welcome your
input to this Conference.
FidoNews 6-51 Page 37 18 Dec 1989
-----------------------------------------------------------------