textfiles/bbs/FIDONET/FIDONEWS/fido0909.nws

1608 lines
74 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
The newsletter of the |
FidoNet BBS community | Published by:
_ |
/ \ | "FidoNews" BBS
/|oo \ | (415)-863-2739
(_| /_) | FidoNet 1:1/1
_`@/_ \ _ | Internet:
| | \ \\ | fidonews@fidonews.fidonet.org
| (*) | \ )) |
|__U__| / \// | Editors:
_//|| _\ / | Tom Jennings
(_/(_|(____/ | Tim Pozar
(jm) |
----------------------------+---------------------------------------
Published weekly by and for the Members of the FidoNet international
amateur network. Copyright 1992, Fido Software. All rights reserved.
Duplication and/or distribution permitted for noncommercial purposes
only. For use in other circumstances, please contact FidoNews.
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
For more information about FidoNews refer to the end of this file.
--------------------------------------------------------------------
Table of Contents
1. EDITORIAL ..................................................... 1
Editorial: None of the error(s) was found ..................... 1
2. ARTICLES ...................................................... 2
The Joy of Handles ............................................ 2
Bashing the Beliefs of Others in FidoNews ..................... 15
A Day in the Life of a Different Teenage SysOp ................ 19
3. LATEST VERSIONS ............................................... 23
Software List ................................................. 23
4. FIDONEWS INFORMATION .......................................... 29
FidoNews 9-09 Page 1 2 Mar 1992
======================================================================
EDITORIAL
======================================================================
Editorial: None of the error(s) was found.
by Tom Jennings (1:1/1)
Once again, this week's FidoSnooze is being automatically
generated. Most likely, you'll get only one copy (I don't often
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
repeat the same painful mistake. This time I'm certain that
nothing will go wrong.
----------------------------------------------------------------------
FidoNews 9-09 Page 2 2 Mar 1992
======================================================================
ARTICLES
======================================================================
The Joy of Handles
Mahatma Kane Jeeves
101/138.8
David Lescohier
101/138.0
THE JOY OF HANDLES
------------------
or:
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
(but have no right to ask)
--------------------------
* * * * *
We should never so entirely avoid danger as to appear
irresolute and cowardly. But, at the same time, we should
avoid unnecessarily exposing ourselves to danger, than
which nothing can be more foolish. [Cicero]
* * * * *
Do you trust me?
If you participate in computer conferencing, and you use
your real name, then you'd better.
"Why?", you ask. "What can you do with my name?" To start
with, given that and your origin line, I can probably look
you up in your local phone book, and find out where you
live. Even if you are unlisted, there are ways to locate
you based on your name. If you own any property, or pay any
utility bills, your address is a matter of public record.
Do you have children in the public schools? It would be
easy to find out. But that's just the beginning.
Former Chairman of the U.S. Privacy Protection Commission
David F. Linowes, in his book "Privacy in America" (1989),
writes of New York private investigator Irwin Blye:
FidoNews 9-09 Page 3 2 Mar 1992
"Challenged to prove his contention that, given a little
time and his usual fee, he could learn all about an
individual without even speaking with him, Blye was
presented with a subject -- a New Jersey
newspaperman.... The result was a five-page, single-
spaced, typed report which documented, though not always
accurately, a wide sweep of the journalist's past, and
was detailed to the point of disclosing his father's
income before his retirement."
Who am I? If I don't post, you might not even know I exist.
I could be on your local Police Department, or an agent
working with the IRS, or some federal law-enforcement
agency. I could be a member of some fanatical hate group,
or criminal organization. I might even be a former Nixon
White-House staffer!
I could be that pyromaniacal teenager you flamed last
weekend, for posting a step-by-step description of how he
made plastic explosive in his high-school chem lab. He
seemed kind of mad.
But you're an upstanding citizen; you have nothing to hide.
So why not use your name on the nets? Trust me. There's
nothing to worry about.
Is there?
* * * * *
WHAT'S ALL THIS BROUHAHA?
-------------------------
Stupidity is evil waiting to happen. [Clay Bond]
Not long ago in Fidonet's BCSNET echo (the Boston Computer
Society's national conference), the following was posted by
the conference moderator to a user calling himself "Captain
Kirk":
"May we ask dear Captain Kirk that it would be very
polite if you could use your real name in an echomail
conference? This particular message area is shared
with BBS's all across the country and everyone else is
using their real name. It is only common courtesy to
FidoNews 9-09 Page 4 2 Mar 1992
do so in an echomail conference."
One of us (mkj) responded with a post questioning that
policy. Soon the conference had erupted into a heated
debate! Although mkj had worried that the subject might be
dismissed as trivial, it apparently touched a nerve. It
brought forth debate over issues and perceptions central to
computer communications in general, and it revealed profound
disparities in fundamental values and assumptions among
participants.
This article is a response to that debate, and to the
prevailing negative attitudes regarding the use of handles.
Handles seem to have a bad reputation. Their use is
strangely unpopular, and frequently forbidden by network
authorities. Many people seem to feel that handles are rude
or dishonest, or that anyone wishing to conceal his or her
identity must be up to no good. It is the primary purpose
of this article to dispel such prejudices.
Let us make one thing perfectly clear here at the outset: We
do NOT challenge the need or the right of sysops to know the
identities of their users! But we do believe that a sysop
who collects user names has a serious responsibility to
protect that information. This means making sure that no
one has access to the data without a legal warrant, and it
certainly means not pressuring users to broadcast their real
names in widespread public forums such as conferences.
* * * * *
SO YOU WANT TO BE A STAR?
-------------------------
John Lennon died for our sins. [anonymous]
Andy Warhol said that "In the future, everyone will be
famous for fifteen minutes". The computer nets, more than
any other medium, lend credibility to this prediction. A
network conference may span the globe more completely than
even satellite TV, yet be open to anyone who can afford the
simplest computer and modem. Through our participation in
conferencing, each of us becomes, if only briefly, a public
figure of sorts -- often without realizing it, and without
any contemplation of the implications and possible
consequences.
FidoNews 9-09 Page 5 2 Mar 1992
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
periodic surveys of Usenet conference readership. His
statistical results for the end of 1991 show that of the
1,459 conferences which currently make up Usenet, more than
fifty percent have over 20,000 readers apiece; the most
popular conferences are each seen by about 200,000 readers!
Mr. Reid's estimate of total Usenet readership is nearly TWO
MILLION people.
Note that Mr. Reid's numbers are for Usenet only; they do
not include any information on other large public nets such
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
they take into account thousands of private networks which
may have indirect public network connections. The total
number of users with access to public networks is unknown,
but informed estimates range to the tens of millions, and
the number keeps growing at an amazing pace -- in fact, the
rate of growth of this medium may be greater than any other
communications medium in history.
The special problems and risks which arise when one deals
with a large public audience are something about which most
computer users have little or no experience or
understanding. Until recently, those of us involved in
computer conferencing have comprised a small and rather
elite community. The explosion in network participation is
catching us all a little unprepared.
Among media professionals and celebrities, on the other
hand, the risks of conducting one's business in front of a
public audience are all too familiar. If the size of one's
audience becomes sufficiently large, one must assume that
examples of virtually every personality type will be
included: police and other agents of various governments,
terrorists, murderers, rapists, religious fanatics, the
mentally ill, robbers and con artists, et al ad infinitum.
It must also be assumed that almost anything you do, no
matter how innocuous, could inspire at least one person,
somewhere, to harbor ill will toward you.
The near-fatal stabbing of actress Theresa Saldana is a case
in point. As she was walking to her car one morning near her
West Hollywood apartment, a voice behind her asked, "Are you
Theresa Saldana?"; when she turned to answer, a man she had
never seen before pulled out a kitchen knife and stabbed her
repeatedly.
After her lengthy and painful recovery, she wrote a book on
the experience ("Beyond Survival", 1986). In that book she
wrote:
FidoNews 9-09 Page 6 2 Mar 1992
[pg 12] "... Detective Kalas informed me that the
assailant, whom he described as a Scottish drifter, had
fixated upon me after seeing me in films."
[pg 28] "... it was through my work as an actress that
the attacker had fixated on me. Naturally, this made
me consider getting out of show business ..."
[pg 34] "For security, I adopted an alias and became
'Alicia Michaels.' ... during the months that followed
I grew so accustomed to it that, to this day, I still
answer reflexively when someone calls the name Alicia!"
Or consider the fate of Denver radio talk show host Alan
Berg, who in 1984 died outside his home in a hail of
gunfire. Police believe he was the victim of a local neo-
nazi group who didn't like his politics.
We are reminded of the murders of John Lennon and Rebecca
Shaffer; the Reagan/Hinckley/Foster incident; and a long
string of other "celebrity attacks" of all sorts, including
such bizarre events as the occupation of David Letterman's
home by a strange woman who claimed to be his wife! There is
probably no one in public life who doesn't receive at least
the occassional threatening letter.
Of course, ordinary participants in network conferencing may
never attract quite the attention that other types of
celebrities attract. But consider the following, rather less
apocalyptic scenarios:
-- On Friday night you post a message to a public
conference defending an unpopular or controversial
viewpoint. On Monday morning your biggest client
cancels a major contract. Or you are kept up all
night by repeated telephone calls from someone
demanding that you "stop killing babies"!
-- You buy your teenage son or daughter a computer and
modem. Sometime later you find your lawn littered
with beer bottles and dug up with tire marks, or
your home vandalized or burglarized.
-- One day you are nominated to the Supreme Court. Who
are all these strange people on TV claiming to be
your friends? How did that fellow know your position
on abortion? Your taste in GIFs?
Celebrities and other professional media personalities
accept the risks and sacrifices of notoriety, along with the
benefits, as part of their chosen careers. Should computer
conference participants be expected to do the same? And who
should be making these decisions?
FidoNews 9-09 Page 7 2 Mar 1992
* * * * *
OTHER MEDIA
-----------
When thou art at Rome, do as they do at Rome [Cervantes]
Older media seem to address the problems of privacy very
differently than computer media, at least so far. We are
not aware of ANY medium or publication, apart from computer
conferencing, where amateur or even most professional
participants are required to expose their true names against
their will. Even celebrities frequently use "stage names",
and protect their addresses and phone numbers as best they
can.
When a medium caters specifically to the general public,
participants are typically given even greater opportunities
to protect their privacy. Television talk shows have been
known to go so far as to employ silhouetting and electronic
alteration of voices to protect the identities of guests,
and audience members who participate are certainly not
required to state their full names before speaking.
The traditional medium most analogous to computer
conferencing may be talk radio. Like conferencing, talk
radio is a group discussion and debate medium oriented
toward controversy, where emotions can run high. Programs
often center around a specific topic, and are always run by
a "host" whose role seems analogous in many respects to that
of a conference moderator. It is therefore worth noting
that in talk radio generally, policy seems to be that
callers are identified on the air only by their first names
(unless of course they volunteer more).
Finally, of course, authors have published under "pen names"
since the dawn of publishing, and newspapers and magazines
frequently publish letters to the editor with "name and
address withheld by request" as the signature line. Even
founding fathers Alexander Hamilton, James Madison and John
Jay, in authoring the seminal Federalist Papers in 1787 for
publication in the Letters columns of various New York City
newspapers, concealed their identities behind the now-famous
psuedonym "Publius".
What would you think if someone called a radio talk show
demanding to know the identity of a previous caller? Such a
demand would undoubtedly be seen as menacing and
inappropriate in that context. Yet that same demand seems
to arise without much challenge each time a handle shows up
in a computer conference. The authors of this article feel
that such demands should always be looked upon as
FidoNews 9-09 Page 8 2 Mar 1992
suspicious, and that it would be beneficial for moderators
to take upon themselves the responsibility of making sure
that besieged handle-users are aware of their right to
refuse such inappropriate demands.
It is reasonable to assume that privacy policies in
traditional media are the result of hard-won wisdom gained
from long experience. Are we so arrogant that we cannot
learn from others? It is not hard to imagine the sorts of
problems and experiences which shaped these policies in the
old media. Will we have to wait for similar problems to
occur on the computer networks before we learn?
* * * * *
PRIVACY AND SURVEILLANCE
------------------------
In an effort to identify people who fail to file tax
returns, the Internal Revenue Service is matching
its files against available lists of names and
addresses of U.S. citizens who have purchased
computers for home use. The IRS continues to seek
out sources for such information. This information
is matched against the IRS master file of taxpayers
to see if those who have not filed can be
identified.
[COMPUTERWORLD, Sept. 1985]
Date: Thu, 23 May 91 11:58:07 PDT
From: mmm@cup.portal.com
Subject: The RISKS of Posting to the Net
-
I just had an interesting visit from the FBI. It
seems that a posting I made to sci.space several
months ago had filtered through channels, caused the
FBI to open (or re-open) a file on me, and an agent
wanted to interview me, which I did voluntarily...
I then went on to tell him about the controversy
over Uunet, and their role in supplying archives of
Usenet traffic on tape to the FBI...
[RISKS Digest]
Also frequent are instances where computers are
seized incident to an unrelated arrest. For
example, on February 28, 1991, following an arrest
FidoNews 9-09 Page 9 2 Mar 1992
on charges of rape and battery, the Massachusetts
state and local police seized the suspect's computer
equipment. The suspect reportedly operated a 650-
subscriber bulletin board called "BEN," which is
described as "geared largely to a gay/leather/S&M
crowd." It is not clear what the board's seizure is
supposed to have accomplished, but the board is now
shut down, and the identities and messages of its
users are in the hands of the police.
[CONSTITUTIONAL, LEGAL, AND ETHICAL
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
FILES IN THE AGE OF CYBERSPACE, Harvey A.
Silverglate and Thomas C. Viles]
Most of us have been brought up to be grateful for the fact
that we live in a nation where freedom is sacred. In other
countries, we are told as children, people are afraid to
speak their minds for fear they are being watched. Thank
God we live in America!
It would surprise most of us to learn that America is
currently among the premiere surveillance nations in the
world, but such, sadly, is indeed the case. Our leadership
in technology has helped the U.S. government to amass as
much information on its citizens as almost any other nation
in history, totalitarian or otherwise. And to make matters
worse, a consumer surveillance behemoth has sprung up
consisting of huge private data-collection agencies which
cater to business.
As Evan Hendricks, editor of "Privacy Times" (a Washington
D.C.-based newsletter) has put it: "You go through life
dropping bits and pieces of information about yourself
everywhere. Most people don't realize there are big vacuum
cleaners out there sucking it all up." [Wall Street
Journal, March 14, 1991].
To get an idea of how much of your privacy has already been
lost, consider the bits and pieces of information about
yourself which are already available to investigators, and
how thoroughly someone might come to know you by these clues
alone.
A person's lifestyle and personality are largely described,
for example, by his or her purchases and expenses; from your
checking account records -- which banks are required by law
to keep and make available to government investigators -- a
substantial portrait of your life will emerge. Credit card
records may reveal much of the same information, and can
also be used to track your movements. (In a recent case,
"missing" Massachusetts State Representative Timothy O'Leary
was tracked by credit-card transactions as he fled across
the country, and his movements were reported on the nightly
news!)
FidoNews 9-09 Page 10 2 Mar 1992
Then there are your school records, which include IQ and
other test results, comments on your "socialization" by
teachers and others, and may reveal family finances in great
detail. Employment and tax records reveal your present
income, as well as personal comments by employers and co-
workers. Your properties are another public record of your
income and lifestyle, and possibly your social status as
well. Telephone billing records reveal your personal and
business associations in more detail. Insurance records
reveal personal and family health histories and treatments.
All of this information is commonly accessed by government
and private or corporate investigators. And this list is
far from exhaustive!
Now consider how easily the computer networks lend
themselves to even further erosions of personal privacy. The
actual contents of our mail and telephone traffic have up to
now been subjected to deliberate scrutiny only under
extraordinary conditions. This built-in safety is due
primarily to the difficulty and expense of conducting
surveillance in these media, which usually requires extended
human intervention. But in the medium of computer
communications, most surveillance can be conducted using
automated monitoring techniques. Tools currently available
make it possible and even cost-effective for government and
other interests to monitor virtually everything which
happens here.
Why would anyone want to monitor network users? It is well
documented that, throughout the 1960s and 1970s, the FBI and
other agencies of government, in operations such as the
infamous COINTELPRO among others, spent a great deal of time
and effort collecting vast lists of names. As Computer
Underground Digest moderators Jim Thomas and Gordon Meyer
recalled in a recent commentary (CuD #3.42):
"A 1977 class action suit against the Michigan State
Police learned, through FOIA requests, that state and
federal agents would peruse letters to the editor of
newspapers and collect clippings of those whose politics
they did not like. These news clippings became the basis
of files on those persons that found there way into the
hands of other agencies and employers."
To get onto one of these government "enemies" lists, you
often needed to do nothing more than telephone an
organization under surveillance, or subscribe to the "wrong"
types of magazines and newspapers. Groups engaged in
political activism, including environmental and women's
rights organizations, were commonly infiltrated. The sort
of investi-gative reporting which uncovered these lists and
surveillances back in the '60s and '70s is now rare, but
there is little reason to assume that such activities have
ceased or even slowed. In fact, progressive computerization
of local police LEIU activities (Law Enforcement
FidoNews 9-09 Page 11 2 Mar 1992
Intelligence Units, commonly known as "red squads") suggests
that such activities may have greatly increased.
Within the realm of computer conferencing especially, there
is ample reason to believe that systematic monitoring is
being conducted by government and law-enforcement
organizations, and perhaps by other hostile interests as
well. In a recent issue of Telecom Digest
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
on the results of a recent Freedom of Information Act
request for documents from the Secret Service:
" ... The documents also show that the Secret Service
established a computer database to keep track of
suspected computer hackers. This database contains
records of names, aliases, addresses, phone numbers,
known associates, a list of activities, and various
[conference postings] associated with each individual."
But the privacy issues which surround computer
communications go far beyond the collection of user lists.
Both government and industry have long pursued the elusive
grail of personality profiling on citizens and consumers. Up
to now, such ambitions have been restrained by the practical
difficulty and expense of collecting and analyzing large
amounts of information on large numbers of citizens. But
computer communications, more than any other technology,
seems to hold out the promise that this unholy grail may
finally be in sight.
To coin a phrase, never has so much been known by so few
about so many. The information commonly available to
government and industry investi-gators today is sufficient
to make reliable predictions about our personalities,
health, politics, future behavior, our vulnerabilities,
perhaps even about our innermost thoughts and feelings. The
privacy we all take for granted is, in fact, largely an
illusion; it no longer exists in most walks of life. If we
wish to preserve even the most basic minimum of personal
privacy, it seems clear that we need to take far better care
on the networks than we have taken elsewhere.
* * * * *
FREEDOM
-------
FidoNews 9-09 Page 12 2 Mar 1992
Human beings are the only species with a history.
Whether they also have a future is not so obvious.
The answer will lie in the prospects for popular
movements, with firm roots among all sectors of the
population, dedicated to values that are suppressed
or driven to the margins within the existing social
and political order...
[Noam Chomsky]
In your day-to-day social interactions, as you deal with
employers, clients, public officials, friends, acquaintances
and total strangers, how often do you feel you can really
speak freely? How comfortable are you discussing
controversial issues such as religion, taxes, politics,
racism, sexuality, abortion or AIDS, for example? Would you
consider it appropriate or wise to express an honest opinion
on such an issue to your boss, or a client? To your
neighbors?
Most of us confine such candid discussions to certain
"trusted" social contexts, such as when we are among our
closest friends. But when you post to a network conference,
your boss, your clients, and your neighbors may very well
read what you post -- if they are not on the nets today,
they probably will be soon, as will nearly everyone.
If we have to consider each post's possible impact on our
social and professional reputations, on our job security and
income, on our family's acceptance and safety in the
community, it could be reckless indeed to express ourselves
freely on the nets. Yet conferences are often geared to
controversy, and inhibitions on the free expression of
opinions can reduce traffic to a trickle, killing off an
important conference topic or distorting a valuable sampling
of public opinion.
More important still is the role computer networks are
beginning to play in the free and open dissemination of news
and information. Democracy is crippled if dissent and
diversity in the media are compromised; yet even here in the
U.S., where a "free press" is a cherished tradition, the
bulk of all the media is owned by a small (and ever-
shrinking) number of corporations, whose relatively narrow
culture, interests and perspec-tives largely shape the
public perception.
Computer communication, on the other hand, is by its nature
very difficult to control or shape. Its resources are
scattered; when one BBS goes bust (or is busted!), three
others spring up in its place. The natural resiliency of
computer communications (and other new, decentral-ized
information technologies such as fax, consumer camcorders
and cheap satellite links) is giving rise to a new brand of
global "guerrilla journalism" which includes everyone, and
defies efforts at suppression.
FidoNews 9-09 Page 13 2 Mar 1992
The power and value of this new journalistic freedom has
recently shown itself during the Gulf War, and throughout
Eastern Europe and the Soviet Union, as well as within the
U.S. Just think of the depth and detail of information
available on the nets regarding the Secret Service's recent
"Operation Sundevil" and associated activities, compared to
the grossly distorted, blatantly propagandistic coverage of
those same activities given to the general public through
the traditional media.
Historically, established power and wealth have seldom been
disposed to tolerate uncontrolled media, and recent events
in this country and elsewhere show that computer media are
sometimes seen as threats to established interests as well.
To understand the role of handles in this context, it is
useful to note the flurries of anti-handle sentiment which
have arisen in the wake of crackdowns such as Sundevil, or
the Tom Tcimpidis raid in the early 1980s. Although few
charges and fewer convictions have typically resulted from
such operations, one might be tempted to speculate that the
real purposes -- to terrorize the nets and chill freedoms of
speech and assembly thereon -- have been achieved.
In this way, sysops and moderators become unwitting
accomplices in the supression of freedom on the networks.
When real name requirements are instituted, anyone who fears
retaliation of any sort, by any group, will have to fear
participation in the nets; hence content is effectively
controlled. This consideration becomes especially important
as the nets expand into even more violent and repressive
countries outside the U.S.
We must decide whether freedom of information and open
public discussion are in fact among the goals of network
conferencing, and if so, whether handles have a role in
achieving these goals. As access to the networks grows, we
have a rare opportunity to frustrate the efforts of
governments and corporations to control the public mind! In
this way above all others, computers may have the potential
to shape the future of all mankind for the better.
* * * * *
A CALL TO ACTION
----------------
FidoNews 9-09 Page 14 2 Mar 1992
The move to electronic communication may be a turning
point that history will remember. Just as in
seventeenth and eighteenth century Great Britain and
America a few tracts and acts set precedents for
print by which we live today, so what we think and do
today may frame the information system for a
substantial period in the future.
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
There was a time when anybody with some gear and a few
batteries could become a radio broadcaster -- no license
required. There was a time when anyone with a sense of
adventure could buy a plane, and maybe get a contract to
carry mail. Those early technological pioneers were
probably unable to imagine the world as it is today, but
their influence is strongly felt in current laws,
regulations and policies with roots in the traditions and
philosophies they founded and shaped.
Today the new pioneers are knitting the world together with
computers, and the world is changing faster than ever. Law
and ethics are scrambling to keep up. How far will this
growth take us? No one can say for sure. But you don't
need a crystal ball to see that computer communications has
the potential to encompass and surpass all the functionality
of prior media -- print, post, telegraph, telephone, radio
and television -- and more. It seems reasonable to assume
that computer communications will be at least as ubiquitous
and important in the lives of our grandchildren as all the
older media have been in ours.
It will be a world whose outlines we can now make out only
dimly. But the foundations of that world are being built
today by those of us exploring and homesteading on the
electronic frontier. We need to look hard at what it will
take to survive in the information age.
In this article we have attempted to show, for one very
narrow issue, what some of the stakes may be in this future-
building game. But the risks associated with exposing your
name in a computer conference are not well defined, and
various people will no doubt assess the importance of these
risks differently. After all, most of us take risks every
day which are probably greater than the risks associated
with conferencing. We drive on the expressway. We eat
sushi. To some people, the risks of conferencing may seem
terrifying; to others, insignificant.
But let us not get side-tracked into unresolvable arguments
on the matter. The real issue here is not how dangerous
conferencing may or may not be; it is whether you and I will
be able to make our own decisions, and protect ourselves (or
not) as we see fit. The obvious answer is that users must
exercise their collective power to advance their own
interests, and to pressure sysops and moderators to become
FidoNews 9-09 Page 15 2 Mar 1992
more sensitive to user concerns.
To help in that effort, we would like to recommend the
following guidelines for user action:
-- Bear in mind John Perry Barlow's observation that
"Liberties are preserved by using them". Let your
sysop know that you would prefer to be using a
handle, and use one wherever you can.
-- Try to support boards and conferences which allow
handles, and avoid those which don't.
-- When using a handle, BEHAVE RESPONSIBLY! There will
always be irresponsible users on the nets, and they
will always use handles. It is important for the
rest of us to fight common anti-handle prejudices by
showing that handles are NOT always the mark of an
irresponsible user!
-- Educate others about the importance of handles (but
NEVER argue or flame anyone about it).
To sysops and moderators: We ask you to bear in mind that
authority is often used best where it is used least. Grant
users the right to engage in any harmless and responsible
behaviors they choose. Protect your interests in ways which
tread as lightly as possible upon the interests of others.
The liberties you preserve may be your own!
In building the computer forums of today, we are building
the social fabric of tomorrow. If we wish to preserve the
free and open atmosphere which has made computer networking
a powerful force, while at the same time taking care against
the risks inherent in such a force, handles seem to be a
remarkably harmless, entertaining and effective tool to help
us. Let's not throw that tool away.
----------------------------------------------------------------------
Jack Decker
Fidonet 1:154/8
BASHING THE BELIEFS OF OTHERS IN FIDONEWS
Back in June of 1991 I sent an article to FidoNews rebutting one of
Steve Winter's articles. However, due to various technical problems,
it didn't get to Tom Jennings until much later, and because of that
we agreed that it would be better if it was not published at that
time.
FidoNews 9-09 Page 16 2 Mar 1992
However, recently Steve Winter has taken to publishing near-weekly
notices promoting his HOLY_BIBLE conference. He certainly has a
right to do that (if the FidoNews editor doesn't object), and I would
normally not object to that. But it seems that every week he gets a
little bolder in stating his particular view that the vast majority
of Christians are in fact cultists. For example, in FidoNews 9-07,
he states (in regard to his PRIME network): "This should not be
confused with the three god or other cult psudo (sic) christian
networks. This is the only real Christian network that uses Fido or
PCRelay style messaging software."
Now, I'm not insisting that Steve believe in the Holy Trinity if he
doesn't want to, although it seems to me a real reach to believe that
when the Bible talks about God the Father, Jesus, the Holy Spirit,
Jesus praying to God the Father, etc. that these are really all one
and the same person. It's a fringe viewpoint not shared by most of
Christianity.
What bothers me about Steve's posts is that he doesn't seem to
believe that a person could look at all those verses (rather than the
obscure passages he takes out of context to "prove" his viewpoint)
and still be a true Christian. And, he makes no bones about labeling
all these other Christians as "cult psudo (sic) christian".
By doing this, not only is Steve violating the entire thrust of
Romans chapter 14 (I'll leave it as an exercise for the reader to
study this chapter of the Bible), but he is sitting in judgement of
other Christians. In Matthew 7:1, the Bible states: "Do not judge,
or you too will be judged. For in the same way that you judge
others, you will be judged, and with the measure you use, it will be
measured to you."
I am concerned that those who read Steve's posts and messages may
become confused by his distortions of the scriptures. Therefore, I
wish to offer two pieces of advice:
First: Whenever someone quotes a Bible verse to you to prove a
point, you should STOP RIGHT THERE and LOOK IT UP (if they're at your
front door, make them wait while you do it)! Then read the verse IN
CONTEXT. See who it's addressed to, and what it's talking about.
Read several verses above and below it to get the context. If people
would just do this, they would often see that certain verses don't
mean what some folks say they mean. Be especially careful when
people start hopping all over the Bible, connecting otherwise
unrelated scriptures to make a point.
Second: Be especially careful of those who add extra conditions to
salvation. The Bible says "Believe in the Lord Jesus, and you will
be saved!" (see Acts 16:30) Those who try to add other conditions
are on shaky ground. In particular, be wary of those who point to
one example of someone doing something in the New Testament after
salvation, and using that as a "model" of something that all
newly-saved Christians MUST do to be saved. The fact that Zacchaeus
the tax collector gave half of his possessions to the poor and
offered to make restitution (at the rate of four times the original
amount!) to anyone he had cheated does not make that a requirement
FidoNews 9-09 Page 17 2 Mar 1992
for salvation, nor something that newly-saved Christians must do.
Similarly, the fact that some Christians may have spoke in other
languages ("tongues") or may have been baptized after salvation does
NOT make those things conditions of salvation. They may be desirable
things to do, and some may feel that they must do them to be obedient
to God, but that is their personal conviction and it is wrong to try
and force that personal conviction on others, or worse yet, to label
those who don't share those convictions as unsaved or "false"
Christians, especially in a public forum such as FidoNews (as Steve
did in an article last summer, the one to which I originally wrote
the rebuttal).
To those of you who may be reading Steve's posts and find that you
are being thrown into confusion and doubt, I would suggest you read
Paul's epistle to the Galatians, especially chapter 1, verses 6-9
(but read the whole book, since Paul is really coming against this
sort of legalism throughout the book). Also read Romans chapter 14
and ask yourself if Steve's posts are consistent with the message of
that chapter.
I hope that the FidoNews editor (and readers of FidoNews) will begin
to look at Steve's articles a bit more carefully, and be aware that
these are not just advertisements for Steve's echo, but that they
also contain disparaging remarks about those who do not believe as he
does, and about echoes that may permit or even support other
theological viewpoints. I guess it's okay to promote your own echo
(though I question whether we need to see such promotion nearly every
week), but it's quite another thing to tear down other echoes or
networks because they may not go along with your narrow theological
viewpoint.
----------------------------------------------------------------------
*I Didn't Know I Would Say That!
by Devin Ganger, 1:349/4.1
1497 Poplar Drive #3, Medford, OR 97504 (USA)
Co-SysOp, The Crypt, 1:349/4
I Didn't Know I Would Say That! (or, I Say More Action Less Talk!)
Frankly, I love Fidonet.
Having said that, let me introduce myself. My name is Devin Ganger,
and I run a point located in Medford, OR. One of these days, I will
switch over to a full node, but first I must get a job to pay for my
addiction to the world of Fidonet. Right now I can manage the somewhat
dubious practice of sneaking netmail connects on my parents' phone
bill, not to mention small file requests or transmissions (like, say,
getting the Fidonews article specifications and submitting the
resulting article to Fidonews.) Right now, I am an out-of-work 19
year old computer science major, currently out of school due to recent
problems with health and financial aid, but I'll get back to the work
of learning things I already know in the fall.
FidoNews 9-09 Page 18 2 Mar 1992
I haven't been associated with Fidonet for a long time, but in my short
acquaintance so far I have had fun. It all started when I set up as a
point under a local system. Then, the BBS I was SysOp'ing for my
college club decided, through the insistence of the club founder and
the other club dignitaries (myself and my housemates <grin>), to join
Fidonet. And for a brief shining moment I actually had a board listed
in the almighty NODELIST. Then, I got sick and had to come home. It's
only been in the last month or so that another SysOp in my area got
into Fidonet, replacing my bossnode of the previous summer (who had
decided to call it quits.) And now, I am once again a point.
It's interesting to see how my local area is changing. Medford and
the surrounding towns in the Rogue Valley have been dominated by
another network for as long as I have been here (I would mention names
but I want to keep my language polite). Lately, though, shakeups in
the structure of That Other Net have made a lot of SysOps and users
take a long look at alternatives. As one of the louder voices in my
area, I succeeded in getting people to look at Fidonet.
My concern, though, has been rising at some of the comments they make.
One user, who also runs a point in Fido (from a different part of the
country), has said that he generally uses Fido only as a mail drop,
finding that intelligent and challenging posts are nowhere to be found
on Fido. Others claim that the structure and hierarchy of Fidonet are,
well, restrictive and inhibiting to the looseness they like to find in
their modeming adventures.
Personally, I see their style of modeming as TOO loose. I enjoy a good
flame as much as anyone, but to have flames carrying over out of the
designated areas into the general chatter, and even into the SysOp
administration areas (which, actually, doesn't surprise me so much as
make me chuckle in remembrance of some of the really good fights I've
seen), is something that I find annoying. And then to have someone
claim it is their "right" to do so, since the only thing stopping them
is common consensus (which they feel obligated to break at all costs)
that such behavior is anappropriate, only rubs salt in the wound.
As much as I would like to totally refute their claims, though, I
can't. I remember the energy wasted in debating controversial issues,
calling names and slinging mud, instead of solving problems. I see
contention raising up everywhere in the structure, some people claiming
that policy isn't stringent enough while others say it's too stringent.
And I feel just a little bit sad. This network, the pioneer in amateur
BBS networks, has solved the problems of linking isolated systems from
all over the world, of getting boards and computers representing varied
operating systems to communicate on common terms, and of adapting new
innovations to current standards. Yet I can also see that all that
problem-solving might just go to waste, or be left behind, muddling in
pure technical issues while other networks take Fido technology and
apply it in exciting new ways.
FidoNews 9-09 Page 19 2 Mar 1992
The culprit, as I see it? An unwillingness to compromise. In its
early days when Fidonet was small and the members were all of like
minds, solutions and growth were easy. Now, with a membership that
requires 1.2 megs of nodelist to represent, some of the old attitudes
HAVE to go. This is a hobby for myself and for (I believe) everyone
else in Fidonet. Yet we tend to forget that it is other peoples'
hobbies as well. Can we afford to keep tight grip on our attitudes of
"The Way Things Should Be Done" when doing so only makes the system
break down? That's not pleasant for anyone.
We have to be willing to compromise. For the old-timers, that means
letting go of some of the old ways of operation, while for the
newcomers (like myself), that means actually listening to the things
those more experienced have to say. It means setting aside power
games (for incumbents AND wanna-be's). It means actually starting to
do something, instead of filling the network with rants, flames, and
suggestions on how to correct it.
When I started writing this, it was only supposed to be a short article
crowing over the fact that systems in my area are switching to Fidonet
and abandoning another network. But my words, I guess, are something
I needed to say. Hopefully, they're what you needed to hear. If I
stepped on your toes, flames can be directed to my address -- I, to be
honest, don't get much netmail and would love having a flood pour upon
me, even if it is telling me I'm too general, or picking on this, or
slamming on that, or telling me that my mother is the busiest gal in
town (especially when the fleet comes in.)
Rest assured, however, I am going to do my best to act upon my words.
After all, somebody has to do something. I haven't gotten into any
bitter debates yet, nor have I seen any major disgruntlement other than
through the articles in Fidonews; I don't want to. This IS still fun
for me. I hope that other people -- the people who HAVE been in bitter
debates -- will once again decide to make it fun for themselves and for
others too.
----------------------------------------------------------------------
Dave Blaser
FidoNet: 1:221/401
I recently saw an article in FidoNews by Mitchell Harding about the
average day of a 15 year old System Operator. I thought I might just
compare how different my average day is from Mitchell's.. just for fun.
Don't get me wrong, I'm not trying to compete with any of the other
SysOps out there, but just the contrary. I want them to understand how
we teenage SysOps manage in the strange world that we live in, and let
me tell you, it's great.
FidoNews 9-09 Page 20 2 Mar 1992
Now, I don't go to a Private school or anything. Just a plain old
Public School like all the other ordinary average kids that attend
there. Only difference between myself and any of the other students
that attend this particular school is that I own and operate a very
small, and nearly free, Public Service.
Anyways, back to the point of this article. I don't get up at 6:00 in
the AM, but have a hard enough time dragging myself out at 7:30AM.
Quick shower, and dressing then to "Data".. yup, you guessed it, the
BBS. Check out the mail I may or may not have recieved, and reply to
it if it's important enough.. otherwise, unrecieve it until I get home.
Next, off to school.. great stuff living in Southern Ontario in the
Winter. You freeze your tail off waiting to be picked up by an even
colder School Bus, to get taken to sheer hell with teachers who are
stimulating enough to put you to sleep ( I've fallen asleep in Math
more than once ;D ). Getting to school on time is no problem, classes
usually don't start until about 9:00, so I've got enough time to get a
hot coffee, and catch up on the local gossip. Who's doing what with
whom, and that kind of stuff.
First class: Technology Communications with Terry Golletz. A nice
enough teacher, easy to get along with but... a great talker (sure
hopes he doesn't get wind of this article, or else there goes my
mark!). My friends and I usually sit in the class playing with the
Amiga, or the Video Editing Equipment for the period accomplishing
nothing. Next, off to Chemistry. This class is THE BEST! We have
real fun doing the Labs, and the teacher is a really great guy. After
Chem is English. We're watching "Mississippi Burning" in class right
now, so that's cool.. not doing alot. Math.. ugh. Mr. Downes puts
more people to sleep in that class than good ole Mr. Sandman on a busy
night. Lucky me, I've got fifth period off as a lunch, so I starve to
death waiting just to ingest a small bag of chips or something of the
like since the Cafeteria Closed 5 minutes before I managed to get to
it.
Okay, a pretty productive day so far wouldn't you say? That's not the
end of it. I manage to somehow get home on the freezer we call a Bus
by around 4:30PM and run into my room first to see if I recieved any
letters.. most days I won't, but on the odd occasion, I'll recieve mail
from Borland International trying to sell me something. Next, on to
the BBS to check for any FeedBack and new files. On the average day,
I'll get in one or two new files from my ever so generous clan of users
(if they were REALLY generous, I'd be seeing alot more membership
cheques coming in than I do right now.. HINT HINT!!). ReArj the file,
scan for viruses with both McAffee's VirusScan and Central Point
AntiVirus, then put the file into the proper area.
Homework comes sometime after this, and usually only lasts about ten
minutes before I finish with everything, and begin doing things that
the teacher didn't ask for. So I put the books away, and see if I can
find something, ANYTHING to do.. something usually pops up, so I end up
doing that until 10:00PM when I get off to bed.
FidoNews 9-09 Page 21 2 Mar 1992
This has been the average day of a 17 Year old Canadian SysOp working
towards his Engineering/Computer Science Degree at Acton District High
School in Acton Ontario. Hope you enjoyed reading this almost as much
as I enjoyed writing it.
----------------------------------------------------------------------
Derek R. Cosby
Fidonet Node 1:375/100
SUBJECT: Discrimination
Tom, I sent this once, but I don't know if you got it so I'm sending
it again, but this time I sent it as a file for FIDONEWS. I think this
issue should be addressed as soon as possible. I read this article a
few weeks ago and I was very upset about what had happened to this
individual. As you and everyone out there reads the below paragraph
you'll see how one individual was pushed off her FIDO point and how
cruel a group of individuals can be. Why are people so discriminatory
when it comes to female SYSOPS. Their sex or anyones at that matter
shouldn't be used to judge anyone on anything. I hope a lesson is
learned from this article and I hope the individuals mentioned below
learn that if they are going to be discriminative towards anyone that
rebuttal is due to come out of it.
MESSAGE FROM MELODY
SUBJECT: Need Information
Hi everyone. I am a die-hard Wildcat! enthusiast and have run into some
recent problems with the fellow sysops in my town regarding
getting fido echos. There are about 6 sysops who carry Netmail/ Fido
here, and none of them use Wildcat! Recently, I enlisted the aid of
a couple of sysops to help get my system netmail compatible, and they
were not knowledgeable enough to get the D'Bridge/Wildcat!3.0/Wildmail
interface working. I finally had the capacity to send and receive
netmail and echomail but it was not tossing to my board. I was getting
some technical help from Wildmail (long distance) on this, but the
discriminatory attitudes of the sysops in my town against Wildcat
software were outrageous. They all called it "Wildkitty." I had my
node number and started sending netmail to the area coordinator, Dennis
Theime (1:213/213). I kept asking what the procedures were that I
should follow in order to get an area fix, and he completely ignored my
questions. I was then told by another sysop that the area coordinator
said to him, "I am not going to tell her anything." Finally, I was able
to find out the procedure from someone on getting an area fix, and I
sent the request in to the coordinator three times. Each was ignored.
I felt that if I was going to have to fight for every scrap of
information from this group of prejudiced people, then I might as well
throw in the towel (as much I wanted Fido echos on my board!!) I posted
a letter in the local echo to please cancel me, because getting infor-
mation was like pulling teeth. The die-hard RBBS sysops jumped on
my case and attacked me like you wouldn't believe. They kept saying,
"All you had to do was ask" but I asked, and I asked, and I asked!
No one knew that the area coordinator was pulling this on me, and I,
trying to be nice, did not publicly accuse him directly. When I
said that I was not getting any response from the mail machine, the
area coordinator never came forward to defend himself. What I need to
FidoNews 9-09 Page 22 2 Mar 1992
know is, is there a "head area coordinator" that I can complain to? I
still want to carry fidonet echos and yet cannot get around the
discrimination against "Wildkitty" and women sysops in my town. (BTW,
they "kicked out" the only other 2 female sysops in the Net right before
I came along.) Also, can I get fidoechos by bypassing these jerks? I
would be glad to call long distance to pick up the echos I need. Any
help and advice is greatly appreciated. Since I am no longer in my local
Net, I call the Mustang headquarters BBS to pick up my mail.
Thanks so much
Melody
Voice: (702)747-2607 Call collect if you are a Fidonet CEO who is
interested in following up on the area coordinator's misconduct.
* Origin: The Data Connection! (Echonet 50:5205/6) (1:3625/465)
--- OLX 2.1 TD Vangaard Keep, Sumter SC, (803)469-3814, 1:376/100
----------------------------------------------------------------------
FidoNews 9-09 Page 23 2 Mar 1992
======================================================================
LATEST VERSIONS
======================================================================
Latest Greatest SoftWare Versions
Latest Update: 01/27/92
----------------------------------------------------------------------
MS-DOS Systems
--------------
BBS Software NodeList Utilities Compression
Name Version Name Version Utilities
-------------------- -------------------- Name Version
ADTBBS 1.50@ EditNL 4.00 --------------------
Aurora 1.32b FDND 1.10 ARC 7.12
DMG 2.93 MakeNL 2.31 ARJ 2.20
DreamBBS 1.05 Parselst 1.33 LHA 2.13
Fido/FidoNet 12.21 Prune 1.40 PAK 2.51
Genesis Deluxe 3.2 SysNL 3.14 PKPak 3.61
GSBBS 3.02 XlatList 2.90 PKZip 1.10
Kitten 1.01 XlaxNode/Diff 2.53
Lynx 1.30
Maximus-CBCS 2.00
Merlin 1.39n Other Utilities(A-M) Other Utilities(N-Z)
Opus 1.73a* Name Version Name Version
Oracomm 5.M.6P@ -------------------- --------------------
Oracomm Plus 6.E@ 2DAPoint 1.50* Netsex 2.00b
PCBoard 14.5a 4Dog/4DMatrix 1.18 OFFLINE 1.35
Phoenix 1.07* ARCAsim 2.31 Oliver 1.0a
ProBoard 1.20* ARCmail 3.00* OSIRIS CBIS 3.02
QuickBBS 2.75 Areafix 1.20 PKInsert 7.10
RBBS 17.3b ConfMail 4.00 PolyXarc 2.1a
RemoteAccess 1.11* Crossnet 1.5 QM 1.00a
SimplexBBS 1.05 DOMAIN 1.42 QSort 4.04
SLBBS 2.15C* DEMM 1.06 RAD Plus 2.11
Socrates 1.11 DGMM 1.06 Raid 1.00
SuperBBS 1.12* DOMAIN 1.42 RBBSMail 18.0
SuperComm 0.99 EEngine 0.32 ScanToss 1.28
TAG 2.5g EMM 2.11* ScMail 1.00
TBBS 2.1 EZPoint 2.1 ScEdit 1.12
TComm/TCommNet 3.4 FGroup 1.00 Sirius 1.0x
Telegard 2.7* FidoPCB 1.0s@ SLMail 2.15C
TPBoard 6.1 FNPGate 2.70 SquishMail 1.00
TriTel 2.0* GateWorks 3.06e StarLink 1.01
WildCat! 3.02* GMail 2.05 TagMail 2.41
WWIV 4.20 GMD 3.10 TCOMMail 2.2
XBBS 1.77 GMM 1.21 Telemail 1.5*
GoldEd 2.31p TGroup 1.13
GROUP 2.23 TIRES 3.11
Network Mailers GUS 1.40 TMail 1.21
Name Version Harvey's Robot 4.10 TosScan 1.00
-------------------- HeadEdit 1.18 UFGATE 1.03
BinkleyTerm 2.50 HLIST 1.09 VPurge 4.09e
D'Bridge 1.30 IMAIL 1.20 WEdit 2.0@
Dreamer 1.06 InterPCB 1.31 WildMail 2.00
FidoNews 9-09 Page 24 2 Mar 1992
Dutchie 2.90c ISIS 5.12@ WMail 2.2
FrontDoor 2.02 Lola 1.01d WNode 2.1
InterMail 2.01 Mosaic 1.00b XRS 4.99
Milqtoast 1.00 MailBase 4.11a@ XST 2.3e
PreNM 1.48 MSG 4.5* YUPPIE! 2.00
SEAdog 4.60 MSGED 2.06 ZmailH 1.25
SEAmail 1.01 MsgLnk 1.0c ZSX 2.40
TIMS 1.0(mod8) MsgMstr 2.03a
MsgNum 4.16d
MSGTOSS 1.3
OS/2 Systems
------------
BBS Software Other Utilities(A-M Other Utilities(N-Z)
Name Version Name Version Name Version
-------------------- -------------------- --------------------
Kitten 1.01 ARC 7.12 oMMM 1.52
Maximus-CBCS 2.00 ARC2 6.01 Omail 3.1
SimplexBBS 1.04.02+ ConfMail 4.00 Parselst 1.33
EchoStat 6.0 PKZip 1.02
EZPoint 2.1 PMSnoop 1.30
Network Mailers FGroup 1.00 PolyXOS2 2.1a
Name Version GROUP 2.23 QSort 2.1
-------------------- LH2 2.11 Raid 1.0
BinkleyTerm 2.50 MSG 4.2 Remapper 1.2
BinkleyTerm(S) 2.50 MsgEd 2.06c SquishMail 1.00
BinkleyTerm/2-MT MsgLink 1.0c Tick 2.0
1.40.02 MsgNum 4.16d VPurge 4.09e
SEAmail 1.01
Xenix/Unix 386
--------------
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
ARC 5.21
C-LHARC 1.00
MsgEd 2.06
|Contact: Willy Paine 1:343/15,| MSGLINK 1.01
|or Eddy van Loo 2:285/406 | oMMM 1.42
Omail 1.00
ParseLst 1.32
Unzip 3.10
VPurge 4.08
Zoo 2.01
FidoNews 9-09 Page 25 2 Mar 1992
QNX
---
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
QTach2 1.09 QMM 0.50s Kermit 2.03
QCP 1.02
NodeList Utilities Archive Utilities QSave 3.6
Name Version Name Version QTTSysop 1.07.1
-------------------- -------------------- SeaLink 1.05
QNode 2.09 Arc 6.02 XModem 1.00
LH 1.00.2 YModem 1.01
Unzip 2.01 ZModem 0.02f
Zoo 2.01
Apple II
--------
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
DDBBS + 8.0* Fruity Dog 2.0 deARC2e 2.1
GBBS Pro 2.1 ProSel 8.70*
ShrinkIt 3.30*
|Contact: Dennis McClain-Furmanski 1:275/42| ShrinkIt GS 1.04
Apple CP/M
----------
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
Daisy 2j Daisy Mailer 0.38 Filer 2-D
MsgUtil 2.5
Nodecomp 0.37
PackUser 4
UNARC.Com 1.20
Macintosh
---------
BBS Software Network Mailers Other Software
Name Version Name Version Name Version
-------------------- -------------------- --------------------
FBBS 0.91 Copernicus 1.0 ArcMac 1.3
Hermes 1.6.1 Tabby 2.2 AreaFix 1.6
Mansion 7.15 Compact Pro 1.30
Precision Sys. 0.95b EventMeister 1.0
Red Ryder Host 2.1 Export 3.21
Telefinder Host Import 3.2
FidoNews 9-09 Page 26 2 Mar 1992
2.12T10 LHARC 0.41
MacArd 0.04
Mantissa 3.21
Point System Mehitable 2.0
Software OriginatorII 2.0
Name Version PreStamp 3.2
-------------------- StuffIt Classic 1.6
Copernicus 1.00 SunDial 3.2
CounterPoint 1.09 TExport 1.92
MacWoof 1.1 TimeStamp 1.6
TImport 1.92
Tset 1.3
TSort 1.0
UNZIP 1.02c
Zenith 1.5
Zip Extract 0.10
Amiga
-----
BBS Software Network Mailers Other Software
Name Version Name Version Name Version
-------------------- -------------------- --------------------
4D-BBS 1.65 BinkleyTerm 1.00 Areafix 1.48
DLG Pro. 0.96b TrapDoor 1.80 AReceipt 1.5
Falcon CBCS 1.00 WelMat 0.44 ChameleonEdit 0.11
Starnet 1.0q@ ConfMail 1.12
TransAmiga 1.07 ElectricHerald 1.66
XenoLink 1.0 Compression FFRS 1.0@
Utilities FileMgr 2.08
Name Version Fozzle 1.0@
NodeList Utilities -------------------- Login 0.18
Name Version AmigArc 0.23 MessageFilter 1.52
-------------------- booz 1.01 Message View 1.12
ParseLst 1.66 LHARC 1.30 oMMM 1.50
Skyparse 2.30 LhA 1.10 PolyXAmy 2.02
TrapList 1.40 LZ 1.92 RMB 1.30
PkAX 1.00 Roof 46.15
UnZip 4.1 RoboWriter 1.02
Zippy (Unzip) 1.25 Rsh 4.07a
Zoo 2.01 Tick 0.75
TrapToss 1.20
|Contact: Maximilian Hantsch 2:310/6| Yuck! 2.02
Atari ST/TT
-----------
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
FIDOdoor/ST 2.5.1 BinkleyTerm 2.40n9 ApplyList 1.00@
FiFo 2.1v The Box 1.95* Burep 1.1
LED ST 1.00 ComScan 1.04
MSGED 1.99 ConfMail 4.10
QuickBBS/ST 1.06* NodeList Utilities Echoscan 1.10
FidoNews 9-09 Page 27 2 Mar 1992
Name Version FDrenum 2.5.2
-------------------- FastPack 1.20
Compression ParseList 1.30 Import 1.14
Utilities EchoFix 1.20 oMMM 1.40
Name Version sTICK/Hatch 5.50 Pack 1.00
-------------------- Trenum 0.10
ARC 6.02
LHARC 2.01i
PackConvert
STZip 1.1*
UnJARST 2.00
WhatArc 2.02
Archimedes
----------
BBS Software Network Mailers Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
ARCbbs 1.61 BinkleyTerm ARC 1.20
Odyssey 0.37 2.06f-wimp !AskFor 1.01
RiscBBS 0.9.85m BatchPacker 1.00
DeLZ 0.01
MailED 0.95
NetFile 1.00
ParseLst 1.30
Raul 1.01
!Spark 2.16
!SparkMail 2.08
!SparkPlug 2.14
UnArj 2.21
UnZip 3.00
Zip 1.00
Tandy Color Computer 3 (OS-9 Level II)
--------------------------------------
BBS Software Compression Utility Other Utilities
Name Version Name Version Name Version
-------------------- -------------------- --------------------
RiBBS 2.02+ Ar 1.3 Ascan 1.2
DeArc 5.12 AutoFRL 2.0
OS9Arc 1.0 Bundle 2.2
UnZip 3.10 CKARC 1.1
UnLZH 3.0 EchoCheck 1.01
FReq 2.5a
LookNode 2.00
ParseLST
PReq 2.2
FidoNews 9-09 Page 28 2 Mar 1992
RList 1.03
RTick 2.00
UnBundle 1.4
UnSeen 1.1
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Key: + - Netmail Capable (Doesn't Require Additional Mailer Software)
* - Recently Updated Version
@ - New Addition
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
The Complete List is Available For FReq as VERSIONS from 1:103/250
Utility Authors: Please help keep this list up to date by reporting
all new versions to 1:103/250 in this format:
1) Software Name & Version 2) FileName.Ext
3) Support Node Address 4) Support BBS Phone Number
Note: It is not our intent to list all utilities here, only those
which verge on necessity. If you want it updated in the next
FidoNews, get it to me by Thursday evening.
--David French, 1:103/250
----------------------------------------------------------------------
FidoNews 9-09 Page 29 2 Mar 1992
======================================================================
FIDONEWS INFORMATION
======================================================================
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
Editors: Tom Jennings, Tim Pozar
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Periello
"FidoNews" BBS
FidoNet 1:1/1
Internet fidonews@fidonews.fidonet.org
BBS (415)-863-2739 (9600 HST/V32)
(Postal Service mailing address)
FidoNews
Box 77731
San Francisco
CA 94107 USA
Published weekly by and for the Members of the FidoNet international
amateur electronic mail system. It is a compilation of individual
articles contributed by their authors or their authorized agents. The
contribution of articles to this compilation does not diminish the
rights of the authors. Opinions expressed in these articles are those
of the authors and not necessarily those of FidoNews.
FidoNews is copyright 1992 Fido Software. All rights reserved.
Duplication and/or distribution permitted for noncommercial purposes
only. For use in other circumstances, please contact FidoNews (we're
easy).
OBTAINING COPIES: FidoNews in electronic form may be obtained from
the FidoNews BBS via manual download or Wazoo FileRequest, or from
various sites in the FidoNet and via uucp. PRINTED COPIES mailed
may be obtained from Fido Software for $5.00US each PostPaid First
Class within North America, or $7.00US elsewhere, mailed Air Mail.
(US funds drawn upon a US bank only.)
Periodic subscriptions are not available at this time; if enough
people request it I will implement it.
SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
from 1:1/1 as file "ARTSPEC.DOC".
FidoNews 9-09 Page 30 2 Mar 1992
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco
CA 94107, USA and are used with permission.
-- END
----------------------------------------------------------------------