1608 lines
74 KiB
Plaintext
1608 lines
74 KiB
Plaintext
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
|
||
The newsletter of the |
|
||
FidoNet BBS community | Published by:
|
||
_ |
|
||
/ \ | "FidoNews" BBS
|
||
/|oo \ | (415)-863-2739
|
||
(_| /_) | FidoNet 1:1/1
|
||
_`@/_ \ _ | Internet:
|
||
| | \ \\ | fidonews@fidonews.fidonet.org
|
||
| (*) | \ )) |
|
||
|__U__| / \// | Editors:
|
||
_//|| _\ / | Tom Jennings
|
||
(_/(_|(____/ | Tim Pozar
|
||
(jm) |
|
||
----------------------------+---------------------------------------
|
||
Published weekly by and for the Members of the FidoNet international
|
||
amateur network. Copyright 1992, Fido Software. All rights reserved.
|
||
Duplication and/or distribution permitted for noncommercial purposes
|
||
only. For use in other circumstances, please contact FidoNews.
|
||
|
||
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
|
||
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
|
||
|
||
For more information about FidoNews refer to the end of this file.
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
Table of Contents
|
||
1. EDITORIAL ..................................................... 1
|
||
Editorial: None of the error(s) was found ..................... 1
|
||
2. ARTICLES ...................................................... 2
|
||
The Joy of Handles ............................................ 2
|
||
Bashing the Beliefs of Others in FidoNews ..................... 15
|
||
A Day in the Life of a Different Teenage SysOp ................ 19
|
||
3. LATEST VERSIONS ............................................... 23
|
||
Software List ................................................. 23
|
||
4. FIDONEWS INFORMATION .......................................... 29
|
||
FidoNews 9-09 Page 1 2 Mar 1992
|
||
|
||
|
||
======================================================================
|
||
EDITORIAL
|
||
======================================================================
|
||
|
||
Editorial: None of the error(s) was found.
|
||
|
||
by Tom Jennings (1:1/1)
|
||
|
||
Once again, this week's FidoSnooze is being automatically
|
||
generated. Most likely, you'll get only one copy (I don't often
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
repeat the same painful mistake. This time I'm certain that
|
||
nothing will go wrong.
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
FidoNews 9-09 Page 2 2 Mar 1992
|
||
|
||
|
||
======================================================================
|
||
ARTICLES
|
||
======================================================================
|
||
|
||
|
||
The Joy of Handles
|
||
Mahatma Kane Jeeves
|
||
101/138.8
|
||
David Lescohier
|
||
101/138.0
|
||
|
||
|
||
|
||
|
||
THE JOY OF HANDLES
|
||
------------------
|
||
or:
|
||
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
|
||
(but have no right to ask)
|
||
--------------------------
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
We should never so entirely avoid danger as to appear
|
||
irresolute and cowardly. But, at the same time, we should
|
||
avoid unnecessarily exposing ourselves to danger, than
|
||
which nothing can be more foolish. [Cicero]
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
Do you trust me?
|
||
|
||
If you participate in computer conferencing, and you use
|
||
your real name, then you'd better.
|
||
|
||
"Why?", you ask. "What can you do with my name?" To start
|
||
with, given that and your origin line, I can probably look
|
||
you up in your local phone book, and find out where you
|
||
live. Even if you are unlisted, there are ways to locate
|
||
you based on your name. If you own any property, or pay any
|
||
utility bills, your address is a matter of public record.
|
||
Do you have children in the public schools? It would be
|
||
easy to find out. But that's just the beginning.
|
||
|
||
Former Chairman of the U.S. Privacy Protection Commission
|
||
David F. Linowes, in his book "Privacy in America" (1989),
|
||
writes of New York private investigator Irwin Blye:
|
||
|
||
FidoNews 9-09 Page 3 2 Mar 1992
|
||
|
||
|
||
"Challenged to prove his contention that, given a little
|
||
time and his usual fee, he could learn all about an
|
||
individual without even speaking with him, Blye was
|
||
presented with a subject -- a New Jersey
|
||
newspaperman.... The result was a five-page, single-
|
||
spaced, typed report which documented, though not always
|
||
accurately, a wide sweep of the journalist's past, and
|
||
was detailed to the point of disclosing his father's
|
||
income before his retirement."
|
||
|
||
Who am I? If I don't post, you might not even know I exist.
|
||
I could be on your local Police Department, or an agent
|
||
working with the IRS, or some federal law-enforcement
|
||
agency. I could be a member of some fanatical hate group,
|
||
or criminal organization. I might even be a former Nixon
|
||
White-House staffer!
|
||
|
||
I could be that pyromaniacal teenager you flamed last
|
||
weekend, for posting a step-by-step description of how he
|
||
made plastic explosive in his high-school chem lab. He
|
||
seemed kind of mad.
|
||
|
||
But you're an upstanding citizen; you have nothing to hide.
|
||
So why not use your name on the nets? Trust me. There's
|
||
nothing to worry about.
|
||
|
||
Is there?
|
||
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
WHAT'S ALL THIS BROUHAHA?
|
||
-------------------------
|
||
|
||
|
||
Stupidity is evil waiting to happen. [Clay Bond]
|
||
|
||
|
||
Not long ago in Fidonet's BCSNET echo (the Boston Computer
|
||
Society's national conference), the following was posted by
|
||
the conference moderator to a user calling himself "Captain
|
||
Kirk":
|
||
|
||
"May we ask dear Captain Kirk that it would be very
|
||
polite if you could use your real name in an echomail
|
||
conference? This particular message area is shared
|
||
with BBS's all across the country and everyone else is
|
||
using their real name. It is only common courtesy to
|
||
FidoNews 9-09 Page 4 2 Mar 1992
|
||
|
||
|
||
do so in an echomail conference."
|
||
|
||
One of us (mkj) responded with a post questioning that
|
||
policy. Soon the conference had erupted into a heated
|
||
debate! Although mkj had worried that the subject might be
|
||
dismissed as trivial, it apparently touched a nerve. It
|
||
brought forth debate over issues and perceptions central to
|
||
computer communications in general, and it revealed profound
|
||
disparities in fundamental values and assumptions among
|
||
participants.
|
||
|
||
This article is a response to that debate, and to the
|
||
prevailing negative attitudes regarding the use of handles.
|
||
Handles seem to have a bad reputation. Their use is
|
||
strangely unpopular, and frequently forbidden by network
|
||
authorities. Many people seem to feel that handles are rude
|
||
or dishonest, or that anyone wishing to conceal his or her
|
||
identity must be up to no good. It is the primary purpose
|
||
of this article to dispel such prejudices.
|
||
|
||
Let us make one thing perfectly clear here at the outset: We
|
||
do NOT challenge the need or the right of sysops to know the
|
||
identities of their users! But we do believe that a sysop
|
||
who collects user names has a serious responsibility to
|
||
protect that information. This means making sure that no
|
||
one has access to the data without a legal warrant, and it
|
||
certainly means not pressuring users to broadcast their real
|
||
names in widespread public forums such as conferences.
|
||
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
SO YOU WANT TO BE A STAR?
|
||
-------------------------
|
||
|
||
|
||
John Lennon died for our sins. [anonymous]
|
||
|
||
|
||
Andy Warhol said that "In the future, everyone will be
|
||
famous for fifteen minutes". The computer nets, more than
|
||
any other medium, lend credibility to this prediction. A
|
||
network conference may span the globe more completely than
|
||
even satellite TV, yet be open to anyone who can afford the
|
||
simplest computer and modem. Through our participation in
|
||
conferencing, each of us becomes, if only briefly, a public
|
||
figure of sorts -- often without realizing it, and without
|
||
any contemplation of the implications and possible
|
||
consequences.
|
||
|
||
FidoNews 9-09 Page 5 2 Mar 1992
|
||
|
||
|
||
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
|
||
periodic surveys of Usenet conference readership. His
|
||
statistical results for the end of 1991 show that of the
|
||
1,459 conferences which currently make up Usenet, more than
|
||
fifty percent have over 20,000 readers apiece; the most
|
||
popular conferences are each seen by about 200,000 readers!
|
||
Mr. Reid's estimate of total Usenet readership is nearly TWO
|
||
MILLION people.
|
||
|
||
Note that Mr. Reid's numbers are for Usenet only; they do
|
||
not include any information on other large public nets such
|
||
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
|
||
they take into account thousands of private networks which
|
||
may have indirect public network connections. The total
|
||
number of users with access to public networks is unknown,
|
||
but informed estimates range to the tens of millions, and
|
||
the number keeps growing at an amazing pace -- in fact, the
|
||
rate of growth of this medium may be greater than any other
|
||
communications medium in history.
|
||
|
||
The special problems and risks which arise when one deals
|
||
with a large public audience are something about which most
|
||
computer users have little or no experience or
|
||
understanding. Until recently, those of us involved in
|
||
computer conferencing have comprised a small and rather
|
||
elite community. The explosion in network participation is
|
||
catching us all a little unprepared.
|
||
|
||
Among media professionals and celebrities, on the other
|
||
hand, the risks of conducting one's business in front of a
|
||
public audience are all too familiar. If the size of one's
|
||
audience becomes sufficiently large, one must assume that
|
||
examples of virtually every personality type will be
|
||
included: police and other agents of various governments,
|
||
terrorists, murderers, rapists, religious fanatics, the
|
||
mentally ill, robbers and con artists, et al ad infinitum.
|
||
It must also be assumed that almost anything you do, no
|
||
matter how innocuous, could inspire at least one person,
|
||
somewhere, to harbor ill will toward you.
|
||
|
||
The near-fatal stabbing of actress Theresa Saldana is a case
|
||
in point. As she was walking to her car one morning near her
|
||
West Hollywood apartment, a voice behind her asked, "Are you
|
||
Theresa Saldana?"; when she turned to answer, a man she had
|
||
never seen before pulled out a kitchen knife and stabbed her
|
||
repeatedly.
|
||
|
||
After her lengthy and painful recovery, she wrote a book on
|
||
the experience ("Beyond Survival", 1986). In that book she
|
||
wrote:
|
||
|
||
FidoNews 9-09 Page 6 2 Mar 1992
|
||
|
||
|
||
[pg 12] "... Detective Kalas informed me that the
|
||
assailant, whom he described as a Scottish drifter, had
|
||
fixated upon me after seeing me in films."
|
||
|
||
[pg 28] "... it was through my work as an actress that
|
||
the attacker had fixated on me. Naturally, this made
|
||
me consider getting out of show business ..."
|
||
|
||
[pg 34] "For security, I adopted an alias and became
|
||
'Alicia Michaels.' ... during the months that followed
|
||
I grew so accustomed to it that, to this day, I still
|
||
answer reflexively when someone calls the name Alicia!"
|
||
|
||
Or consider the fate of Denver radio talk show host Alan
|
||
Berg, who in 1984 died outside his home in a hail of
|
||
gunfire. Police believe he was the victim of a local neo-
|
||
nazi group who didn't like his politics.
|
||
|
||
We are reminded of the murders of John Lennon and Rebecca
|
||
Shaffer; the Reagan/Hinckley/Foster incident; and a long
|
||
string of other "celebrity attacks" of all sorts, including
|
||
such bizarre events as the occupation of David Letterman's
|
||
home by a strange woman who claimed to be his wife! There is
|
||
probably no one in public life who doesn't receive at least
|
||
the occassional threatening letter.
|
||
|
||
Of course, ordinary participants in network conferencing may
|
||
never attract quite the attention that other types of
|
||
celebrities attract. But consider the following, rather less
|
||
apocalyptic scenarios:
|
||
|
||
-- On Friday night you post a message to a public
|
||
conference defending an unpopular or controversial
|
||
viewpoint. On Monday morning your biggest client
|
||
cancels a major contract. Or you are kept up all
|
||
night by repeated telephone calls from someone
|
||
demanding that you "stop killing babies"!
|
||
|
||
-- You buy your teenage son or daughter a computer and
|
||
modem. Sometime later you find your lawn littered
|
||
with beer bottles and dug up with tire marks, or
|
||
your home vandalized or burglarized.
|
||
|
||
-- One day you are nominated to the Supreme Court. Who
|
||
are all these strange people on TV claiming to be
|
||
your friends? How did that fellow know your position
|
||
on abortion? Your taste in GIFs?
|
||
|
||
Celebrities and other professional media personalities
|
||
accept the risks and sacrifices of notoriety, along with the
|
||
benefits, as part of their chosen careers. Should computer
|
||
conference participants be expected to do the same? And who
|
||
should be making these decisions?
|
||
|
||
FidoNews 9-09 Page 7 2 Mar 1992
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
OTHER MEDIA
|
||
-----------
|
||
|
||
|
||
When thou art at Rome, do as they do at Rome [Cervantes]
|
||
|
||
|
||
Older media seem to address the problems of privacy very
|
||
differently than computer media, at least so far. We are
|
||
not aware of ANY medium or publication, apart from computer
|
||
conferencing, where amateur or even most professional
|
||
participants are required to expose their true names against
|
||
their will. Even celebrities frequently use "stage names",
|
||
and protect their addresses and phone numbers as best they
|
||
can.
|
||
|
||
When a medium caters specifically to the general public,
|
||
participants are typically given even greater opportunities
|
||
to protect their privacy. Television talk shows have been
|
||
known to go so far as to employ silhouetting and electronic
|
||
alteration of voices to protect the identities of guests,
|
||
and audience members who participate are certainly not
|
||
required to state their full names before speaking.
|
||
|
||
The traditional medium most analogous to computer
|
||
conferencing may be talk radio. Like conferencing, talk
|
||
radio is a group discussion and debate medium oriented
|
||
toward controversy, where emotions can run high. Programs
|
||
often center around a specific topic, and are always run by
|
||
a "host" whose role seems analogous in many respects to that
|
||
of a conference moderator. It is therefore worth noting
|
||
that in talk radio generally, policy seems to be that
|
||
callers are identified on the air only by their first names
|
||
(unless of course they volunteer more).
|
||
|
||
Finally, of course, authors have published under "pen names"
|
||
since the dawn of publishing, and newspapers and magazines
|
||
frequently publish letters to the editor with "name and
|
||
address withheld by request" as the signature line. Even
|
||
founding fathers Alexander Hamilton, James Madison and John
|
||
Jay, in authoring the seminal Federalist Papers in 1787 for
|
||
publication in the Letters columns of various New York City
|
||
newspapers, concealed their identities behind the now-famous
|
||
psuedonym "Publius".
|
||
|
||
What would you think if someone called a radio talk show
|
||
demanding to know the identity of a previous caller? Such a
|
||
demand would undoubtedly be seen as menacing and
|
||
inappropriate in that context. Yet that same demand seems
|
||
to arise without much challenge each time a handle shows up
|
||
in a computer conference. The authors of this article feel
|
||
that such demands should always be looked upon as
|
||
FidoNews 9-09 Page 8 2 Mar 1992
|
||
|
||
|
||
suspicious, and that it would be beneficial for moderators
|
||
to take upon themselves the responsibility of making sure
|
||
that besieged handle-users are aware of their right to
|
||
refuse such inappropriate demands.
|
||
|
||
It is reasonable to assume that privacy policies in
|
||
traditional media are the result of hard-won wisdom gained
|
||
from long experience. Are we so arrogant that we cannot
|
||
learn from others? It is not hard to imagine the sorts of
|
||
problems and experiences which shaped these policies in the
|
||
old media. Will we have to wait for similar problems to
|
||
occur on the computer networks before we learn?
|
||
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
PRIVACY AND SURVEILLANCE
|
||
------------------------
|
||
|
||
|
||
In an effort to identify people who fail to file tax
|
||
returns, the Internal Revenue Service is matching
|
||
its files against available lists of names and
|
||
addresses of U.S. citizens who have purchased
|
||
computers for home use. The IRS continues to seek
|
||
out sources for such information. This information
|
||
is matched against the IRS master file of taxpayers
|
||
to see if those who have not filed can be
|
||
identified.
|
||
[COMPUTERWORLD, Sept. 1985]
|
||
|
||
Date: Thu, 23 May 91 11:58:07 PDT
|
||
From: mmm@cup.portal.com
|
||
Subject: The RISKS of Posting to the Net
|
||
-
|
||
I just had an interesting visit from the FBI. It
|
||
seems that a posting I made to sci.space several
|
||
months ago had filtered through channels, caused the
|
||
FBI to open (or re-open) a file on me, and an agent
|
||
wanted to interview me, which I did voluntarily...
|
||
I then went on to tell him about the controversy
|
||
over Uunet, and their role in supplying archives of
|
||
Usenet traffic on tape to the FBI...
|
||
[RISKS Digest]
|
||
|
||
Also frequent are instances where computers are
|
||
seized incident to an unrelated arrest. For
|
||
example, on February 28, 1991, following an arrest
|
||
FidoNews 9-09 Page 9 2 Mar 1992
|
||
|
||
|
||
on charges of rape and battery, the Massachusetts
|
||
state and local police seized the suspect's computer
|
||
equipment. The suspect reportedly operated a 650-
|
||
subscriber bulletin board called "BEN," which is
|
||
described as "geared largely to a gay/leather/S&M
|
||
crowd." It is not clear what the board's seizure is
|
||
supposed to have accomplished, but the board is now
|
||
shut down, and the identities and messages of its
|
||
users are in the hands of the police.
|
||
[CONSTITUTIONAL, LEGAL, AND ETHICAL
|
||
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
|
||
FILES IN THE AGE OF CYBERSPACE, Harvey A.
|
||
Silverglate and Thomas C. Viles]
|
||
|
||
|
||
Most of us have been brought up to be grateful for the fact
|
||
that we live in a nation where freedom is sacred. In other
|
||
countries, we are told as children, people are afraid to
|
||
speak their minds for fear they are being watched. Thank
|
||
God we live in America!
|
||
|
||
It would surprise most of us to learn that America is
|
||
currently among the premiere surveillance nations in the
|
||
world, but such, sadly, is indeed the case. Our leadership
|
||
in technology has helped the U.S. government to amass as
|
||
much information on its citizens as almost any other nation
|
||
in history, totalitarian or otherwise. And to make matters
|
||
worse, a consumer surveillance behemoth has sprung up
|
||
consisting of huge private data-collection agencies which
|
||
cater to business.
|
||
|
||
As Evan Hendricks, editor of "Privacy Times" (a Washington
|
||
D.C.-based newsletter) has put it: "You go through life
|
||
dropping bits and pieces of information about yourself
|
||
everywhere. Most people don't realize there are big vacuum
|
||
cleaners out there sucking it all up." [Wall Street
|
||
Journal, March 14, 1991].
|
||
|
||
To get an idea of how much of your privacy has already been
|
||
lost, consider the bits and pieces of information about
|
||
yourself which are already available to investigators, and
|
||
how thoroughly someone might come to know you by these clues
|
||
alone.
|
||
|
||
A person's lifestyle and personality are largely described,
|
||
for example, by his or her purchases and expenses; from your
|
||
checking account records -- which banks are required by law
|
||
to keep and make available to government investigators -- a
|
||
substantial portrait of your life will emerge. Credit card
|
||
records may reveal much of the same information, and can
|
||
also be used to track your movements. (In a recent case,
|
||
"missing" Massachusetts State Representative Timothy O'Leary
|
||
was tracked by credit-card transactions as he fled across
|
||
the country, and his movements were reported on the nightly
|
||
news!)
|
||
|
||
FidoNews 9-09 Page 10 2 Mar 1992
|
||
|
||
|
||
Then there are your school records, which include IQ and
|
||
other test results, comments on your "socialization" by
|
||
teachers and others, and may reveal family finances in great
|
||
detail. Employment and tax records reveal your present
|
||
income, as well as personal comments by employers and co-
|
||
workers. Your properties are another public record of your
|
||
income and lifestyle, and possibly your social status as
|
||
well. Telephone billing records reveal your personal and
|
||
business associations in more detail. Insurance records
|
||
reveal personal and family health histories and treatments.
|
||
|
||
All of this information is commonly accessed by government
|
||
and private or corporate investigators. And this list is
|
||
far from exhaustive!
|
||
|
||
Now consider how easily the computer networks lend
|
||
themselves to even further erosions of personal privacy. The
|
||
actual contents of our mail and telephone traffic have up to
|
||
now been subjected to deliberate scrutiny only under
|
||
extraordinary conditions. This built-in safety is due
|
||
primarily to the difficulty and expense of conducting
|
||
surveillance in these media, which usually requires extended
|
||
human intervention. But in the medium of computer
|
||
communications, most surveillance can be conducted using
|
||
automated monitoring techniques. Tools currently available
|
||
make it possible and even cost-effective for government and
|
||
other interests to monitor virtually everything which
|
||
happens here.
|
||
|
||
Why would anyone want to monitor network users? It is well
|
||
documented that, throughout the 1960s and 1970s, the FBI and
|
||
other agencies of government, in operations such as the
|
||
infamous COINTELPRO among others, spent a great deal of time
|
||
and effort collecting vast lists of names. As Computer
|
||
Underground Digest moderators Jim Thomas and Gordon Meyer
|
||
recalled in a recent commentary (CuD #3.42):
|
||
|
||
"A 1977 class action suit against the Michigan State
|
||
Police learned, through FOIA requests, that state and
|
||
federal agents would peruse letters to the editor of
|
||
newspapers and collect clippings of those whose politics
|
||
they did not like. These news clippings became the basis
|
||
of files on those persons that found there way into the
|
||
hands of other agencies and employers."
|
||
|
||
To get onto one of these government "enemies" lists, you
|
||
often needed to do nothing more than telephone an
|
||
organization under surveillance, or subscribe to the "wrong"
|
||
types of magazines and newspapers. Groups engaged in
|
||
political activism, including environmental and women's
|
||
rights organizations, were commonly infiltrated. The sort
|
||
of investi-gative reporting which uncovered these lists and
|
||
surveillances back in the '60s and '70s is now rare, but
|
||
there is little reason to assume that such activities have
|
||
ceased or even slowed. In fact, progressive computerization
|
||
of local police LEIU activities (Law Enforcement
|
||
FidoNews 9-09 Page 11 2 Mar 1992
|
||
|
||
|
||
Intelligence Units, commonly known as "red squads") suggests
|
||
that such activities may have greatly increased.
|
||
|
||
Within the realm of computer conferencing especially, there
|
||
is ample reason to believe that systematic monitoring is
|
||
being conducted by government and law-enforcement
|
||
organizations, and perhaps by other hostile interests as
|
||
well. In a recent issue of Telecom Digest
|
||
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
|
||
on the results of a recent Freedom of Information Act
|
||
request for documents from the Secret Service:
|
||
|
||
" ... The documents also show that the Secret Service
|
||
established a computer database to keep track of
|
||
suspected computer hackers. This database contains
|
||
records of names, aliases, addresses, phone numbers,
|
||
known associates, a list of activities, and various
|
||
[conference postings] associated with each individual."
|
||
|
||
But the privacy issues which surround computer
|
||
communications go far beyond the collection of user lists.
|
||
Both government and industry have long pursued the elusive
|
||
grail of personality profiling on citizens and consumers. Up
|
||
to now, such ambitions have been restrained by the practical
|
||
difficulty and expense of collecting and analyzing large
|
||
amounts of information on large numbers of citizens. But
|
||
computer communications, more than any other technology,
|
||
seems to hold out the promise that this unholy grail may
|
||
finally be in sight.
|
||
|
||
To coin a phrase, never has so much been known by so few
|
||
about so many. The information commonly available to
|
||
government and industry investi-gators today is sufficient
|
||
to make reliable predictions about our personalities,
|
||
health, politics, future behavior, our vulnerabilities,
|
||
perhaps even about our innermost thoughts and feelings. The
|
||
privacy we all take for granted is, in fact, largely an
|
||
illusion; it no longer exists in most walks of life. If we
|
||
wish to preserve even the most basic minimum of personal
|
||
privacy, it seems clear that we need to take far better care
|
||
on the networks than we have taken elsewhere.
|
||
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
FREEDOM
|
||
-------
|
||
|
||
FidoNews 9-09 Page 12 2 Mar 1992
|
||
|
||
|
||
Human beings are the only species with a history.
|
||
Whether they also have a future is not so obvious.
|
||
The answer will lie in the prospects for popular
|
||
movements, with firm roots among all sectors of the
|
||
population, dedicated to values that are suppressed
|
||
or driven to the margins within the existing social
|
||
and political order...
|
||
[Noam Chomsky]
|
||
|
||
|
||
In your day-to-day social interactions, as you deal with
|
||
employers, clients, public officials, friends, acquaintances
|
||
and total strangers, how often do you feel you can really
|
||
speak freely? How comfortable are you discussing
|
||
controversial issues such as religion, taxes, politics,
|
||
racism, sexuality, abortion or AIDS, for example? Would you
|
||
consider it appropriate or wise to express an honest opinion
|
||
on such an issue to your boss, or a client? To your
|
||
neighbors?
|
||
|
||
Most of us confine such candid discussions to certain
|
||
"trusted" social contexts, such as when we are among our
|
||
closest friends. But when you post to a network conference,
|
||
your boss, your clients, and your neighbors may very well
|
||
read what you post -- if they are not on the nets today,
|
||
they probably will be soon, as will nearly everyone.
|
||
|
||
If we have to consider each post's possible impact on our
|
||
social and professional reputations, on our job security and
|
||
income, on our family's acceptance and safety in the
|
||
community, it could be reckless indeed to express ourselves
|
||
freely on the nets. Yet conferences are often geared to
|
||
controversy, and inhibitions on the free expression of
|
||
opinions can reduce traffic to a trickle, killing off an
|
||
important conference topic or distorting a valuable sampling
|
||
of public opinion.
|
||
|
||
More important still is the role computer networks are
|
||
beginning to play in the free and open dissemination of news
|
||
and information. Democracy is crippled if dissent and
|
||
diversity in the media are compromised; yet even here in the
|
||
U.S., where a "free press" is a cherished tradition, the
|
||
bulk of all the media is owned by a small (and ever-
|
||
shrinking) number of corporations, whose relatively narrow
|
||
culture, interests and perspec-tives largely shape the
|
||
public perception.
|
||
|
||
Computer communication, on the other hand, is by its nature
|
||
very difficult to control or shape. Its resources are
|
||
scattered; when one BBS goes bust (or is busted!), three
|
||
others spring up in its place. The natural resiliency of
|
||
computer communications (and other new, decentral-ized
|
||
information technologies such as fax, consumer camcorders
|
||
and cheap satellite links) is giving rise to a new brand of
|
||
global "guerrilla journalism" which includes everyone, and
|
||
defies efforts at suppression.
|
||
FidoNews 9-09 Page 13 2 Mar 1992
|
||
|
||
|
||
The power and value of this new journalistic freedom has
|
||
recently shown itself during the Gulf War, and throughout
|
||
Eastern Europe and the Soviet Union, as well as within the
|
||
U.S. Just think of the depth and detail of information
|
||
available on the nets regarding the Secret Service's recent
|
||
"Operation Sundevil" and associated activities, compared to
|
||
the grossly distorted, blatantly propagandistic coverage of
|
||
those same activities given to the general public through
|
||
the traditional media.
|
||
|
||
Historically, established power and wealth have seldom been
|
||
disposed to tolerate uncontrolled media, and recent events
|
||
in this country and elsewhere show that computer media are
|
||
sometimes seen as threats to established interests as well.
|
||
To understand the role of handles in this context, it is
|
||
useful to note the flurries of anti-handle sentiment which
|
||
have arisen in the wake of crackdowns such as Sundevil, or
|
||
the Tom Tcimpidis raid in the early 1980s. Although few
|
||
charges and fewer convictions have typically resulted from
|
||
such operations, one might be tempted to speculate that the
|
||
real purposes -- to terrorize the nets and chill freedoms of
|
||
speech and assembly thereon -- have been achieved.
|
||
|
||
In this way, sysops and moderators become unwitting
|
||
accomplices in the supression of freedom on the networks.
|
||
When real name requirements are instituted, anyone who fears
|
||
retaliation of any sort, by any group, will have to fear
|
||
participation in the nets; hence content is effectively
|
||
controlled. This consideration becomes especially important
|
||
as the nets expand into even more violent and repressive
|
||
countries outside the U.S.
|
||
|
||
We must decide whether freedom of information and open
|
||
public discussion are in fact among the goals of network
|
||
conferencing, and if so, whether handles have a role in
|
||
achieving these goals. As access to the networks grows, we
|
||
have a rare opportunity to frustrate the efforts of
|
||
governments and corporations to control the public mind! In
|
||
this way above all others, computers may have the potential
|
||
to shape the future of all mankind for the better.
|
||
|
||
|
||
|
||
* * * * *
|
||
|
||
|
||
|
||
A CALL TO ACTION
|
||
----------------
|
||
|
||
|
||
FidoNews 9-09 Page 14 2 Mar 1992
|
||
|
||
|
||
The move to electronic communication may be a turning
|
||
point that history will remember. Just as in
|
||
seventeenth and eighteenth century Great Britain and
|
||
America a few tracts and acts set precedents for
|
||
print by which we live today, so what we think and do
|
||
today may frame the information system for a
|
||
substantial period in the future.
|
||
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
|
||
|
||
|
||
There was a time when anybody with some gear and a few
|
||
batteries could become a radio broadcaster -- no license
|
||
required. There was a time when anyone with a sense of
|
||
adventure could buy a plane, and maybe get a contract to
|
||
carry mail. Those early technological pioneers were
|
||
probably unable to imagine the world as it is today, but
|
||
their influence is strongly felt in current laws,
|
||
regulations and policies with roots in the traditions and
|
||
philosophies they founded and shaped.
|
||
|
||
Today the new pioneers are knitting the world together with
|
||
computers, and the world is changing faster than ever. Law
|
||
and ethics are scrambling to keep up. How far will this
|
||
growth take us? No one can say for sure. But you don't
|
||
need a crystal ball to see that computer communications has
|
||
the potential to encompass and surpass all the functionality
|
||
of prior media -- print, post, telegraph, telephone, radio
|
||
and television -- and more. It seems reasonable to assume
|
||
that computer communications will be at least as ubiquitous
|
||
and important in the lives of our grandchildren as all the
|
||
older media have been in ours.
|
||
|
||
It will be a world whose outlines we can now make out only
|
||
dimly. But the foundations of that world are being built
|
||
today by those of us exploring and homesteading on the
|
||
electronic frontier. We need to look hard at what it will
|
||
take to survive in the information age.
|
||
|
||
In this article we have attempted to show, for one very
|
||
narrow issue, what some of the stakes may be in this future-
|
||
building game. But the risks associated with exposing your
|
||
name in a computer conference are not well defined, and
|
||
various people will no doubt assess the importance of these
|
||
risks differently. After all, most of us take risks every
|
||
day which are probably greater than the risks associated
|
||
with conferencing. We drive on the expressway. We eat
|
||
sushi. To some people, the risks of conferencing may seem
|
||
terrifying; to others, insignificant.
|
||
|
||
But let us not get side-tracked into unresolvable arguments
|
||
on the matter. The real issue here is not how dangerous
|
||
conferencing may or may not be; it is whether you and I will
|
||
be able to make our own decisions, and protect ourselves (or
|
||
not) as we see fit. The obvious answer is that users must
|
||
exercise their collective power to advance their own
|
||
interests, and to pressure sysops and moderators to become
|
||
FidoNews 9-09 Page 15 2 Mar 1992
|
||
|
||
|
||
more sensitive to user concerns.
|
||
|
||
To help in that effort, we would like to recommend the
|
||
following guidelines for user action:
|
||
|
||
-- Bear in mind John Perry Barlow's observation that
|
||
"Liberties are preserved by using them". Let your
|
||
sysop know that you would prefer to be using a
|
||
handle, and use one wherever you can.
|
||
|
||
-- Try to support boards and conferences which allow
|
||
handles, and avoid those which don't.
|
||
|
||
-- When using a handle, BEHAVE RESPONSIBLY! There will
|
||
always be irresponsible users on the nets, and they
|
||
will always use handles. It is important for the
|
||
rest of us to fight common anti-handle prejudices by
|
||
showing that handles are NOT always the mark of an
|
||
irresponsible user!
|
||
|
||
-- Educate others about the importance of handles (but
|
||
NEVER argue or flame anyone about it).
|
||
|
||
To sysops and moderators: We ask you to bear in mind that
|
||
authority is often used best where it is used least. Grant
|
||
users the right to engage in any harmless and responsible
|
||
behaviors they choose. Protect your interests in ways which
|
||
tread as lightly as possible upon the interests of others.
|
||
The liberties you preserve may be your own!
|
||
|
||
In building the computer forums of today, we are building
|
||
the social fabric of tomorrow. If we wish to preserve the
|
||
free and open atmosphere which has made computer networking
|
||
a powerful force, while at the same time taking care against
|
||
the risks inherent in such a force, handles seem to be a
|
||
remarkably harmless, entertaining and effective tool to help
|
||
us. Let's not throw that tool away.
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Jack Decker
|
||
Fidonet 1:154/8
|
||
|
||
BASHING THE BELIEFS OF OTHERS IN FIDONEWS
|
||
|
||
Back in June of 1991 I sent an article to FidoNews rebutting one of
|
||
Steve Winter's articles. However, due to various technical problems,
|
||
it didn't get to Tom Jennings until much later, and because of that
|
||
we agreed that it would be better if it was not published at that
|
||
time.
|
||
|
||
FidoNews 9-09 Page 16 2 Mar 1992
|
||
|
||
|
||
However, recently Steve Winter has taken to publishing near-weekly
|
||
notices promoting his HOLY_BIBLE conference. He certainly has a
|
||
right to do that (if the FidoNews editor doesn't object), and I would
|
||
normally not object to that. But it seems that every week he gets a
|
||
little bolder in stating his particular view that the vast majority
|
||
of Christians are in fact cultists. For example, in FidoNews 9-07,
|
||
he states (in regard to his PRIME network): "This should not be
|
||
confused with the three god or other cult psudo (sic) christian
|
||
networks. This is the only real Christian network that uses Fido or
|
||
PCRelay style messaging software."
|
||
|
||
Now, I'm not insisting that Steve believe in the Holy Trinity if he
|
||
doesn't want to, although it seems to me a real reach to believe that
|
||
when the Bible talks about God the Father, Jesus, the Holy Spirit,
|
||
Jesus praying to God the Father, etc. that these are really all one
|
||
and the same person. It's a fringe viewpoint not shared by most of
|
||
Christianity.
|
||
|
||
What bothers me about Steve's posts is that he doesn't seem to
|
||
believe that a person could look at all those verses (rather than the
|
||
obscure passages he takes out of context to "prove" his viewpoint)
|
||
and still be a true Christian. And, he makes no bones about labeling
|
||
all these other Christians as "cult psudo (sic) christian".
|
||
|
||
By doing this, not only is Steve violating the entire thrust of
|
||
Romans chapter 14 (I'll leave it as an exercise for the reader to
|
||
study this chapter of the Bible), but he is sitting in judgement of
|
||
other Christians. In Matthew 7:1, the Bible states: "Do not judge,
|
||
or you too will be judged. For in the same way that you judge
|
||
others, you will be judged, and with the measure you use, it will be
|
||
measured to you."
|
||
|
||
I am concerned that those who read Steve's posts and messages may
|
||
become confused by his distortions of the scriptures. Therefore, I
|
||
wish to offer two pieces of advice:
|
||
|
||
First: Whenever someone quotes a Bible verse to you to prove a
|
||
point, you should STOP RIGHT THERE and LOOK IT UP (if they're at your
|
||
front door, make them wait while you do it)! Then read the verse IN
|
||
CONTEXT. See who it's addressed to, and what it's talking about.
|
||
Read several verses above and below it to get the context. If people
|
||
would just do this, they would often see that certain verses don't
|
||
mean what some folks say they mean. Be especially careful when
|
||
people start hopping all over the Bible, connecting otherwise
|
||
unrelated scriptures to make a point.
|
||
|
||
Second: Be especially careful of those who add extra conditions to
|
||
salvation. The Bible says "Believe in the Lord Jesus, and you will
|
||
be saved!" (see Acts 16:30) Those who try to add other conditions
|
||
are on shaky ground. In particular, be wary of those who point to
|
||
one example of someone doing something in the New Testament after
|
||
salvation, and using that as a "model" of something that all
|
||
newly-saved Christians MUST do to be saved. The fact that Zacchaeus
|
||
the tax collector gave half of his possessions to the poor and
|
||
offered to make restitution (at the rate of four times the original
|
||
amount!) to anyone he had cheated does not make that a requirement
|
||
FidoNews 9-09 Page 17 2 Mar 1992
|
||
|
||
|
||
for salvation, nor something that newly-saved Christians must do.
|
||
Similarly, the fact that some Christians may have spoke in other
|
||
languages ("tongues") or may have been baptized after salvation does
|
||
NOT make those things conditions of salvation. They may be desirable
|
||
things to do, and some may feel that they must do them to be obedient
|
||
to God, but that is their personal conviction and it is wrong to try
|
||
and force that personal conviction on others, or worse yet, to label
|
||
those who don't share those convictions as unsaved or "false"
|
||
Christians, especially in a public forum such as FidoNews (as Steve
|
||
did in an article last summer, the one to which I originally wrote
|
||
the rebuttal).
|
||
|
||
To those of you who may be reading Steve's posts and find that you
|
||
are being thrown into confusion and doubt, I would suggest you read
|
||
Paul's epistle to the Galatians, especially chapter 1, verses 6-9
|
||
(but read the whole book, since Paul is really coming against this
|
||
sort of legalism throughout the book). Also read Romans chapter 14
|
||
and ask yourself if Steve's posts are consistent with the message of
|
||
that chapter.
|
||
|
||
I hope that the FidoNews editor (and readers of FidoNews) will begin
|
||
to look at Steve's articles a bit more carefully, and be aware that
|
||
these are not just advertisements for Steve's echo, but that they
|
||
also contain disparaging remarks about those who do not believe as he
|
||
does, and about echoes that may permit or even support other
|
||
theological viewpoints. I guess it's okay to promote your own echo
|
||
(though I question whether we need to see such promotion nearly every
|
||
week), but it's quite another thing to tear down other echoes or
|
||
networks because they may not go along with your narrow theological
|
||
viewpoint.
|
||
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
|
||
*I Didn't Know I Would Say That!
|
||
|
||
by Devin Ganger, 1:349/4.1
|
||
1497 Poplar Drive #3, Medford, OR 97504 (USA)
|
||
Co-SysOp, The Crypt, 1:349/4
|
||
I Didn't Know I Would Say That! (or, I Say More Action Less Talk!)
|
||
|
||
Frankly, I love Fidonet.
|
||
|
||
Having said that, let me introduce myself. My name is Devin Ganger,
|
||
and I run a point located in Medford, OR. One of these days, I will
|
||
switch over to a full node, but first I must get a job to pay for my
|
||
addiction to the world of Fidonet. Right now I can manage the somewhat
|
||
dubious practice of sneaking netmail connects on my parents' phone
|
||
bill, not to mention small file requests or transmissions (like, say,
|
||
getting the Fidonews article specifications and submitting the
|
||
resulting article to Fidonews.) Right now, I am an out-of-work 19
|
||
year old computer science major, currently out of school due to recent
|
||
problems with health and financial aid, but I'll get back to the work
|
||
of learning things I already know in the fall.
|
||
FidoNews 9-09 Page 18 2 Mar 1992
|
||
|
||
|
||
I haven't been associated with Fidonet for a long time, but in my short
|
||
acquaintance so far I have had fun. It all started when I set up as a
|
||
point under a local system. Then, the BBS I was SysOp'ing for my
|
||
college club decided, through the insistence of the club founder and
|
||
the other club dignitaries (myself and my housemates <grin>), to join
|
||
Fidonet. And for a brief shining moment I actually had a board listed
|
||
in the almighty NODELIST. Then, I got sick and had to come home. It's
|
||
only been in the last month or so that another SysOp in my area got
|
||
into Fidonet, replacing my bossnode of the previous summer (who had
|
||
decided to call it quits.) And now, I am once again a point.
|
||
|
||
It's interesting to see how my local area is changing. Medford and
|
||
the surrounding towns in the Rogue Valley have been dominated by
|
||
another network for as long as I have been here (I would mention names
|
||
but I want to keep my language polite). Lately, though, shakeups in
|
||
the structure of That Other Net have made a lot of SysOps and users
|
||
take a long look at alternatives. As one of the louder voices in my
|
||
area, I succeeded in getting people to look at Fidonet.
|
||
|
||
My concern, though, has been rising at some of the comments they make.
|
||
One user, who also runs a point in Fido (from a different part of the
|
||
country), has said that he generally uses Fido only as a mail drop,
|
||
finding that intelligent and challenging posts are nowhere to be found
|
||
on Fido. Others claim that the structure and hierarchy of Fidonet are,
|
||
well, restrictive and inhibiting to the looseness they like to find in
|
||
their modeming adventures.
|
||
|
||
Personally, I see their style of modeming as TOO loose. I enjoy a good
|
||
flame as much as anyone, but to have flames carrying over out of the
|
||
designated areas into the general chatter, and even into the SysOp
|
||
administration areas (which, actually, doesn't surprise me so much as
|
||
make me chuckle in remembrance of some of the really good fights I've
|
||
seen), is something that I find annoying. And then to have someone
|
||
claim it is their "right" to do so, since the only thing stopping them
|
||
is common consensus (which they feel obligated to break at all costs)
|
||
that such behavior is anappropriate, only rubs salt in the wound.
|
||
|
||
As much as I would like to totally refute their claims, though, I
|
||
can't. I remember the energy wasted in debating controversial issues,
|
||
calling names and slinging mud, instead of solving problems. I see
|
||
contention raising up everywhere in the structure, some people claiming
|
||
that policy isn't stringent enough while others say it's too stringent.
|
||
And I feel just a little bit sad. This network, the pioneer in amateur
|
||
BBS networks, has solved the problems of linking isolated systems from
|
||
all over the world, of getting boards and computers representing varied
|
||
operating systems to communicate on common terms, and of adapting new
|
||
innovations to current standards. Yet I can also see that all that
|
||
problem-solving might just go to waste, or be left behind, muddling in
|
||
pure technical issues while other networks take Fido technology and
|
||
apply it in exciting new ways.
|
||
|
||
FidoNews 9-09 Page 19 2 Mar 1992
|
||
|
||
|
||
The culprit, as I see it? An unwillingness to compromise. In its
|
||
early days when Fidonet was small and the members were all of like
|
||
minds, solutions and growth were easy. Now, with a membership that
|
||
requires 1.2 megs of nodelist to represent, some of the old attitudes
|
||
HAVE to go. This is a hobby for myself and for (I believe) everyone
|
||
else in Fidonet. Yet we tend to forget that it is other peoples'
|
||
hobbies as well. Can we afford to keep tight grip on our attitudes of
|
||
"The Way Things Should Be Done" when doing so only makes the system
|
||
break down? That's not pleasant for anyone.
|
||
|
||
We have to be willing to compromise. For the old-timers, that means
|
||
letting go of some of the old ways of operation, while for the
|
||
newcomers (like myself), that means actually listening to the things
|
||
those more experienced have to say. It means setting aside power
|
||
games (for incumbents AND wanna-be's). It means actually starting to
|
||
do something, instead of filling the network with rants, flames, and
|
||
suggestions on how to correct it.
|
||
|
||
When I started writing this, it was only supposed to be a short article
|
||
crowing over the fact that systems in my area are switching to Fidonet
|
||
and abandoning another network. But my words, I guess, are something
|
||
I needed to say. Hopefully, they're what you needed to hear. If I
|
||
stepped on your toes, flames can be directed to my address -- I, to be
|
||
honest, don't get much netmail and would love having a flood pour upon
|
||
me, even if it is telling me I'm too general, or picking on this, or
|
||
slamming on that, or telling me that my mother is the busiest gal in
|
||
town (especially when the fleet comes in.)
|
||
|
||
Rest assured, however, I am going to do my best to act upon my words.
|
||
After all, somebody has to do something. I haven't gotten into any
|
||
bitter debates yet, nor have I seen any major disgruntlement other than
|
||
through the articles in Fidonews; I don't want to. This IS still fun
|
||
for me. I hope that other people -- the people who HAVE been in bitter
|
||
debates -- will once again decide to make it fun for themselves and for
|
||
others too.
|
||
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Dave Blaser
|
||
FidoNet: 1:221/401
|
||
|
||
I recently saw an article in FidoNews by Mitchell Harding about the
|
||
average day of a 15 year old System Operator. I thought I might just
|
||
compare how different my average day is from Mitchell's.. just for fun.
|
||
|
||
Don't get me wrong, I'm not trying to compete with any of the other
|
||
SysOps out there, but just the contrary. I want them to understand how
|
||
we teenage SysOps manage in the strange world that we live in, and let
|
||
me tell you, it's great.
|
||
|
||
FidoNews 9-09 Page 20 2 Mar 1992
|
||
|
||
|
||
Now, I don't go to a Private school or anything. Just a plain old
|
||
Public School like all the other ordinary average kids that attend
|
||
there. Only difference between myself and any of the other students
|
||
that attend this particular school is that I own and operate a very
|
||
small, and nearly free, Public Service.
|
||
|
||
Anyways, back to the point of this article. I don't get up at 6:00 in
|
||
the AM, but have a hard enough time dragging myself out at 7:30AM.
|
||
Quick shower, and dressing then to "Data".. yup, you guessed it, the
|
||
BBS. Check out the mail I may or may not have recieved, and reply to
|
||
it if it's important enough.. otherwise, unrecieve it until I get home.
|
||
|
||
Next, off to school.. great stuff living in Southern Ontario in the
|
||
Winter. You freeze your tail off waiting to be picked up by an even
|
||
colder School Bus, to get taken to sheer hell with teachers who are
|
||
stimulating enough to put you to sleep ( I've fallen asleep in Math
|
||
more than once ;D ). Getting to school on time is no problem, classes
|
||
usually don't start until about 9:00, so I've got enough time to get a
|
||
hot coffee, and catch up on the local gossip. Who's doing what with
|
||
whom, and that kind of stuff.
|
||
|
||
First class: Technology Communications with Terry Golletz. A nice
|
||
enough teacher, easy to get along with but... a great talker (sure
|
||
hopes he doesn't get wind of this article, or else there goes my
|
||
mark!). My friends and I usually sit in the class playing with the
|
||
Amiga, or the Video Editing Equipment for the period accomplishing
|
||
nothing. Next, off to Chemistry. This class is THE BEST! We have
|
||
real fun doing the Labs, and the teacher is a really great guy. After
|
||
Chem is English. We're watching "Mississippi Burning" in class right
|
||
now, so that's cool.. not doing alot. Math.. ugh. Mr. Downes puts
|
||
more people to sleep in that class than good ole Mr. Sandman on a busy
|
||
night. Lucky me, I've got fifth period off as a lunch, so I starve to
|
||
death waiting just to ingest a small bag of chips or something of the
|
||
like since the Cafeteria Closed 5 minutes before I managed to get to
|
||
it.
|
||
|
||
Okay, a pretty productive day so far wouldn't you say? That's not the
|
||
end of it. I manage to somehow get home on the freezer we call a Bus
|
||
by around 4:30PM and run into my room first to see if I recieved any
|
||
letters.. most days I won't, but on the odd occasion, I'll recieve mail
|
||
from Borland International trying to sell me something. Next, on to
|
||
the BBS to check for any FeedBack and new files. On the average day,
|
||
I'll get in one or two new files from my ever so generous clan of users
|
||
(if they were REALLY generous, I'd be seeing alot more membership
|
||
cheques coming in than I do right now.. HINT HINT!!). ReArj the file,
|
||
scan for viruses with both McAffee's VirusScan and Central Point
|
||
AntiVirus, then put the file into the proper area.
|
||
|
||
Homework comes sometime after this, and usually only lasts about ten
|
||
minutes before I finish with everything, and begin doing things that
|
||
the teacher didn't ask for. So I put the books away, and see if I can
|
||
find something, ANYTHING to do.. something usually pops up, so I end up
|
||
doing that until 10:00PM when I get off to bed.
|
||
|
||
FidoNews 9-09 Page 21 2 Mar 1992
|
||
|
||
|
||
This has been the average day of a 17 Year old Canadian SysOp working
|
||
towards his Engineering/Computer Science Degree at Acton District High
|
||
School in Acton Ontario. Hope you enjoyed reading this almost as much
|
||
as I enjoyed writing it.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Derek R. Cosby
|
||
Fidonet Node 1:375/100
|
||
|
||
SUBJECT: Discrimination
|
||
|
||
Tom, I sent this once, but I don't know if you got it so I'm sending
|
||
it again, but this time I sent it as a file for FIDONEWS. I think this
|
||
issue should be addressed as soon as possible. I read this article a
|
||
few weeks ago and I was very upset about what had happened to this
|
||
individual. As you and everyone out there reads the below paragraph
|
||
you'll see how one individual was pushed off her FIDO point and how
|
||
cruel a group of individuals can be. Why are people so discriminatory
|
||
when it comes to female SYSOPS. Their sex or anyones at that matter
|
||
shouldn't be used to judge anyone on anything. I hope a lesson is
|
||
learned from this article and I hope the individuals mentioned below
|
||
learn that if they are going to be discriminative towards anyone that
|
||
rebuttal is due to come out of it.
|
||
|
||
MESSAGE FROM MELODY
|
||
SUBJECT: Need Information
|
||
Hi everyone. I am a die-hard Wildcat! enthusiast and have run into some
|
||
recent problems with the fellow sysops in my town regarding
|
||
getting fido echos. There are about 6 sysops who carry Netmail/ Fido
|
||
here, and none of them use Wildcat! Recently, I enlisted the aid of
|
||
a couple of sysops to help get my system netmail compatible, and they
|
||
were not knowledgeable enough to get the D'Bridge/Wildcat!3.0/Wildmail
|
||
interface working. I finally had the capacity to send and receive
|
||
netmail and echomail but it was not tossing to my board. I was getting
|
||
some technical help from Wildmail (long distance) on this, but the
|
||
discriminatory attitudes of the sysops in my town against Wildcat
|
||
software were outrageous. They all called it "Wildkitty." I had my
|
||
node number and started sending netmail to the area coordinator, Dennis
|
||
Theime (1:213/213). I kept asking what the procedures were that I
|
||
should follow in order to get an area fix, and he completely ignored my
|
||
questions. I was then told by another sysop that the area coordinator
|
||
said to him, "I am not going to tell her anything." Finally, I was able
|
||
to find out the procedure from someone on getting an area fix, and I
|
||
sent the request in to the coordinator three times. Each was ignored.
|
||
I felt that if I was going to have to fight for every scrap of
|
||
information from this group of prejudiced people, then I might as well
|
||
throw in the towel (as much I wanted Fido echos on my board!!) I posted
|
||
a letter in the local echo to please cancel me, because getting infor-
|
||
mation was like pulling teeth. The die-hard RBBS sysops jumped on
|
||
my case and attacked me like you wouldn't believe. They kept saying,
|
||
"All you had to do was ask" but I asked, and I asked, and I asked!
|
||
No one knew that the area coordinator was pulling this on me, and I,
|
||
trying to be nice, did not publicly accuse him directly. When I
|
||
said that I was not getting any response from the mail machine, the
|
||
area coordinator never came forward to defend himself. What I need to
|
||
FidoNews 9-09 Page 22 2 Mar 1992
|
||
|
||
|
||
know is, is there a "head area coordinator" that I can complain to? I
|
||
still want to carry fidonet echos and yet cannot get around the
|
||
discrimination against "Wildkitty" and women sysops in my town. (BTW,
|
||
they "kicked out" the only other 2 female sysops in the Net right before
|
||
I came along.) Also, can I get fidoechos by bypassing these jerks? I
|
||
would be glad to call long distance to pick up the echos I need. Any
|
||
help and advice is greatly appreciated. Since I am no longer in my local
|
||
Net, I call the Mustang headquarters BBS to pick up my mail.
|
||
|
||
Thanks so much
|
||
Melody
|
||
|
||
Voice: (702)747-2607 Call collect if you are a Fidonet CEO who is
|
||
interested in following up on the area coordinator's misconduct.
|
||
|
||
* Origin: The Data Connection! (Echonet 50:5205/6) (1:3625/465)
|
||
--- OLX 2.1 TD Vangaard Keep, Sumter SC, (803)469-3814, 1:376/100
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
FidoNews 9-09 Page 23 2 Mar 1992
|
||
|
||
|
||
======================================================================
|
||
LATEST VERSIONS
|
||
======================================================================
|
||
|
||
Latest Greatest SoftWare Versions
|
||
Latest Update: 01/27/92
|
||
----------------------------------------------------------------------
|
||
|
||
MS-DOS Systems
|
||
--------------
|
||
|
||
BBS Software NodeList Utilities Compression
|
||
Name Version Name Version Utilities
|
||
-------------------- -------------------- Name Version
|
||
ADTBBS 1.50@ EditNL 4.00 --------------------
|
||
Aurora 1.32b FDND 1.10 ARC 7.12
|
||
DMG 2.93 MakeNL 2.31 ARJ 2.20
|
||
DreamBBS 1.05 Parselst 1.33 LHA 2.13
|
||
Fido/FidoNet 12.21 Prune 1.40 PAK 2.51
|
||
Genesis Deluxe 3.2 SysNL 3.14 PKPak 3.61
|
||
GSBBS 3.02 XlatList 2.90 PKZip 1.10
|
||
Kitten 1.01 XlaxNode/Diff 2.53
|
||
Lynx 1.30
|
||
Maximus-CBCS 2.00
|
||
Merlin 1.39n Other Utilities(A-M) Other Utilities(N-Z)
|
||
Opus 1.73a* Name Version Name Version
|
||
Oracomm 5.M.6P@ -------------------- --------------------
|
||
Oracomm Plus 6.E@ 2DAPoint 1.50* Netsex 2.00b
|
||
PCBoard 14.5a 4Dog/4DMatrix 1.18 OFFLINE 1.35
|
||
Phoenix 1.07* ARCAsim 2.31 Oliver 1.0a
|
||
ProBoard 1.20* ARCmail 3.00* OSIRIS CBIS 3.02
|
||
QuickBBS 2.75 Areafix 1.20 PKInsert 7.10
|
||
RBBS 17.3b ConfMail 4.00 PolyXarc 2.1a
|
||
RemoteAccess 1.11* Crossnet 1.5 QM 1.00a
|
||
SimplexBBS 1.05 DOMAIN 1.42 QSort 4.04
|
||
SLBBS 2.15C* DEMM 1.06 RAD Plus 2.11
|
||
Socrates 1.11 DGMM 1.06 Raid 1.00
|
||
SuperBBS 1.12* DOMAIN 1.42 RBBSMail 18.0
|
||
SuperComm 0.99 EEngine 0.32 ScanToss 1.28
|
||
TAG 2.5g EMM 2.11* ScMail 1.00
|
||
TBBS 2.1 EZPoint 2.1 ScEdit 1.12
|
||
TComm/TCommNet 3.4 FGroup 1.00 Sirius 1.0x
|
||
Telegard 2.7* FidoPCB 1.0s@ SLMail 2.15C
|
||
TPBoard 6.1 FNPGate 2.70 SquishMail 1.00
|
||
TriTel 2.0* GateWorks 3.06e StarLink 1.01
|
||
WildCat! 3.02* GMail 2.05 TagMail 2.41
|
||
WWIV 4.20 GMD 3.10 TCOMMail 2.2
|
||
XBBS 1.77 GMM 1.21 Telemail 1.5*
|
||
GoldEd 2.31p TGroup 1.13
|
||
GROUP 2.23 TIRES 3.11
|
||
Network Mailers GUS 1.40 TMail 1.21
|
||
Name Version Harvey's Robot 4.10 TosScan 1.00
|
||
-------------------- HeadEdit 1.18 UFGATE 1.03
|
||
BinkleyTerm 2.50 HLIST 1.09 VPurge 4.09e
|
||
D'Bridge 1.30 IMAIL 1.20 WEdit 2.0@
|
||
Dreamer 1.06 InterPCB 1.31 WildMail 2.00
|
||
FidoNews 9-09 Page 24 2 Mar 1992
|
||
|
||
|
||
Dutchie 2.90c ISIS 5.12@ WMail 2.2
|
||
FrontDoor 2.02 Lola 1.01d WNode 2.1
|
||
InterMail 2.01 Mosaic 1.00b XRS 4.99
|
||
Milqtoast 1.00 MailBase 4.11a@ XST 2.3e
|
||
PreNM 1.48 MSG 4.5* YUPPIE! 2.00
|
||
SEAdog 4.60 MSGED 2.06 ZmailH 1.25
|
||
SEAmail 1.01 MsgLnk 1.0c ZSX 2.40
|
||
TIMS 1.0(mod8) MsgMstr 2.03a
|
||
MsgNum 4.16d
|
||
MSGTOSS 1.3
|
||
|
||
|
||
OS/2 Systems
|
||
------------
|
||
|
||
BBS Software Other Utilities(A-M Other Utilities(N-Z)
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
Kitten 1.01 ARC 7.12 oMMM 1.52
|
||
Maximus-CBCS 2.00 ARC2 6.01 Omail 3.1
|
||
SimplexBBS 1.04.02+ ConfMail 4.00 Parselst 1.33
|
||
EchoStat 6.0 PKZip 1.02
|
||
EZPoint 2.1 PMSnoop 1.30
|
||
Network Mailers FGroup 1.00 PolyXOS2 2.1a
|
||
Name Version GROUP 2.23 QSort 2.1
|
||
-------------------- LH2 2.11 Raid 1.0
|
||
BinkleyTerm 2.50 MSG 4.2 Remapper 1.2
|
||
BinkleyTerm(S) 2.50 MsgEd 2.06c SquishMail 1.00
|
||
BinkleyTerm/2-MT MsgLink 1.0c Tick 2.0
|
||
1.40.02 MsgNum 4.16d VPurge 4.09e
|
||
SEAmail 1.01
|
||
|
||
|
||
Xenix/Unix 386
|
||
--------------
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
ARC 5.21
|
||
C-LHARC 1.00
|
||
MsgEd 2.06
|
||
|Contact: Willy Paine 1:343/15,| MSGLINK 1.01
|
||
|or Eddy van Loo 2:285/406 | oMMM 1.42
|
||
Omail 1.00
|
||
ParseLst 1.32
|
||
Unzip 3.10
|
||
VPurge 4.08
|
||
Zoo 2.01
|
||
|
||
|
||
FidoNews 9-09 Page 25 2 Mar 1992
|
||
|
||
|
||
QNX
|
||
---
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
QTach2 1.09 QMM 0.50s Kermit 2.03
|
||
QCP 1.02
|
||
NodeList Utilities Archive Utilities QSave 3.6
|
||
Name Version Name Version QTTSysop 1.07.1
|
||
-------------------- -------------------- SeaLink 1.05
|
||
QNode 2.09 Arc 6.02 XModem 1.00
|
||
LH 1.00.2 YModem 1.01
|
||
Unzip 2.01 ZModem 0.02f
|
||
Zoo 2.01
|
||
|
||
|
||
Apple II
|
||
--------
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
DDBBS + 8.0* Fruity Dog 2.0 deARC2e 2.1
|
||
GBBS Pro 2.1 ProSel 8.70*
|
||
ShrinkIt 3.30*
|
||
|Contact: Dennis McClain-Furmanski 1:275/42| ShrinkIt GS 1.04
|
||
|
||
|
||
Apple CP/M
|
||
----------
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
Daisy 2j Daisy Mailer 0.38 Filer 2-D
|
||
MsgUtil 2.5
|
||
Nodecomp 0.37
|
||
PackUser 4
|
||
UNARC.Com 1.20
|
||
|
||
|
||
Macintosh
|
||
---------
|
||
|
||
BBS Software Network Mailers Other Software
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
FBBS 0.91 Copernicus 1.0 ArcMac 1.3
|
||
Hermes 1.6.1 Tabby 2.2 AreaFix 1.6
|
||
Mansion 7.15 Compact Pro 1.30
|
||
Precision Sys. 0.95b EventMeister 1.0
|
||
Red Ryder Host 2.1 Export 3.21
|
||
Telefinder Host Import 3.2
|
||
FidoNews 9-09 Page 26 2 Mar 1992
|
||
|
||
|
||
2.12T10 LHARC 0.41
|
||
MacArd 0.04
|
||
Mantissa 3.21
|
||
Point System Mehitable 2.0
|
||
Software OriginatorII 2.0
|
||
Name Version PreStamp 3.2
|
||
-------------------- StuffIt Classic 1.6
|
||
Copernicus 1.00 SunDial 3.2
|
||
CounterPoint 1.09 TExport 1.92
|
||
MacWoof 1.1 TimeStamp 1.6
|
||
TImport 1.92
|
||
Tset 1.3
|
||
TSort 1.0
|
||
UNZIP 1.02c
|
||
Zenith 1.5
|
||
Zip Extract 0.10
|
||
|
||
|
||
Amiga
|
||
-----
|
||
|
||
BBS Software Network Mailers Other Software
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
4D-BBS 1.65 BinkleyTerm 1.00 Areafix 1.48
|
||
DLG Pro. 0.96b TrapDoor 1.80 AReceipt 1.5
|
||
Falcon CBCS 1.00 WelMat 0.44 ChameleonEdit 0.11
|
||
Starnet 1.0q@ ConfMail 1.12
|
||
TransAmiga 1.07 ElectricHerald 1.66
|
||
XenoLink 1.0 Compression FFRS 1.0@
|
||
Utilities FileMgr 2.08
|
||
Name Version Fozzle 1.0@
|
||
NodeList Utilities -------------------- Login 0.18
|
||
Name Version AmigArc 0.23 MessageFilter 1.52
|
||
-------------------- booz 1.01 Message View 1.12
|
||
ParseLst 1.66 LHARC 1.30 oMMM 1.50
|
||
Skyparse 2.30 LhA 1.10 PolyXAmy 2.02
|
||
TrapList 1.40 LZ 1.92 RMB 1.30
|
||
PkAX 1.00 Roof 46.15
|
||
UnZip 4.1 RoboWriter 1.02
|
||
Zippy (Unzip) 1.25 Rsh 4.07a
|
||
Zoo 2.01 Tick 0.75
|
||
TrapToss 1.20
|
||
|Contact: Maximilian Hantsch 2:310/6| Yuck! 2.02
|
||
|
||
Atari ST/TT
|
||
-----------
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
FIDOdoor/ST 2.5.1 BinkleyTerm 2.40n9 ApplyList 1.00@
|
||
FiFo 2.1v The Box 1.95* Burep 1.1
|
||
LED ST 1.00 ComScan 1.04
|
||
MSGED 1.99 ConfMail 4.10
|
||
QuickBBS/ST 1.06* NodeList Utilities Echoscan 1.10
|
||
FidoNews 9-09 Page 27 2 Mar 1992
|
||
|
||
|
||
Name Version FDrenum 2.5.2
|
||
-------------------- FastPack 1.20
|
||
Compression ParseList 1.30 Import 1.14
|
||
Utilities EchoFix 1.20 oMMM 1.40
|
||
Name Version sTICK/Hatch 5.50 Pack 1.00
|
||
-------------------- Trenum 0.10
|
||
ARC 6.02
|
||
LHARC 2.01i
|
||
PackConvert
|
||
STZip 1.1*
|
||
UnJARST 2.00
|
||
WhatArc 2.02
|
||
|
||
|
||
Archimedes
|
||
----------
|
||
|
||
BBS Software Network Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
ARCbbs 1.61 BinkleyTerm ARC 1.20
|
||
Odyssey 0.37 2.06f-wimp !AskFor 1.01
|
||
RiscBBS 0.9.85m BatchPacker 1.00
|
||
DeLZ 0.01
|
||
MailED 0.95
|
||
NetFile 1.00
|
||
ParseLst 1.30
|
||
Raul 1.01
|
||
!Spark 2.16
|
||
!SparkMail 2.08
|
||
!SparkPlug 2.14
|
||
UnArj 2.21
|
||
UnZip 3.00
|
||
Zip 1.00
|
||
|
||
|
||
Tandy Color Computer 3 (OS-9 Level II)
|
||
--------------------------------------
|
||
|
||
BBS Software Compression Utility Other Utilities
|
||
Name Version Name Version Name Version
|
||
-------------------- -------------------- --------------------
|
||
RiBBS 2.02+ Ar 1.3 Ascan 1.2
|
||
DeArc 5.12 AutoFRL 2.0
|
||
OS9Arc 1.0 Bundle 2.2
|
||
UnZip 3.10 CKARC 1.1
|
||
UnLZH 3.0 EchoCheck 1.01
|
||
FReq 2.5a
|
||
LookNode 2.00
|
||
ParseLST
|
||
PReq 2.2
|
||
FidoNews 9-09 Page 28 2 Mar 1992
|
||
|
||
|
||
RList 1.03
|
||
RTick 2.00
|
||
UnBundle 1.4
|
||
UnSeen 1.1
|
||
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
Key: + - Netmail Capable (Doesn't Require Additional Mailer Software)
|
||
* - Recently Updated Version
|
||
@ - New Addition
|
||
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
||
|
||
The Complete List is Available For FReq as VERSIONS from 1:103/250
|
||
|
||
Utility Authors: Please help keep this list up to date by reporting
|
||
all new versions to 1:103/250 in this format:
|
||
|
||
1) Software Name & Version 2) FileName.Ext
|
||
3) Support Node Address 4) Support BBS Phone Number
|
||
|
||
|
||
Note: It is not our intent to list all utilities here, only those
|
||
which verge on necessity. If you want it updated in the next
|
||
FidoNews, get it to me by Thursday evening.
|
||
|
||
--David French, 1:103/250
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
FidoNews 9-09 Page 29 2 Mar 1992
|
||
|
||
|
||
======================================================================
|
||
FIDONEWS INFORMATION
|
||
======================================================================
|
||
|
||
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
||
|
||
Editors: Tom Jennings, Tim Pozar
|
||
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Periello
|
||
|
||
"FidoNews" BBS
|
||
FidoNet 1:1/1
|
||
Internet fidonews@fidonews.fidonet.org
|
||
BBS (415)-863-2739 (9600 HST/V32)
|
||
|
||
(Postal Service mailing address)
|
||
FidoNews
|
||
Box 77731
|
||
San Francisco
|
||
CA 94107 USA
|
||
|
||
Published weekly by and for the Members of the FidoNet international
|
||
amateur electronic mail system. It is a compilation of individual
|
||
articles contributed by their authors or their authorized agents. The
|
||
contribution of articles to this compilation does not diminish the
|
||
rights of the authors. Opinions expressed in these articles are those
|
||
of the authors and not necessarily those of FidoNews.
|
||
|
||
|
||
|
||
|
||
FidoNews is copyright 1992 Fido Software. All rights reserved.
|
||
Duplication and/or distribution permitted for noncommercial purposes
|
||
only. For use in other circumstances, please contact FidoNews (we're
|
||
easy).
|
||
|
||
|
||
|
||
OBTAINING COPIES: FidoNews in electronic form may be obtained from
|
||
the FidoNews BBS via manual download or Wazoo FileRequest, or from
|
||
various sites in the FidoNet and via uucp. PRINTED COPIES mailed
|
||
may be obtained from Fido Software for $5.00US each PostPaid First
|
||
Class within North America, or $7.00US elsewhere, mailed Air Mail.
|
||
(US funds drawn upon a US bank only.)
|
||
|
||
Periodic subscriptions are not available at this time; if enough
|
||
people request it I will implement it.
|
||
|
||
|
||
SUBMISSIONS: You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission requirements are contained in the file
|
||
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
||
from 1:1/1 as file "ARTSPEC.DOC".
|
||
|
||
FidoNews 9-09 Page 30 2 Mar 1992
|
||
|
||
|
||
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
||
trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco
|
||
CA 94107, USA and are used with permission.
|
||
|
||
-- END
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
|