textfiles/bbs/FIDONET/FIDONEWS/fido1418.nws

3320 lines
129 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

F I D O N E W S -- Volume 14, Number 18 5 May 1997
+----------------------------+-----------------------------------------+
| The newsletter of the | ISSN 1198-4589 Published by: |
| FidoNet community | "FidoNews" |
| _ | 1-904-409-7040 [1:1/23] |
| / \ | |
| /|oo \ | |
| (_| /_) | |
| _`@/_ \ _ | |
| | | \ \\ | Editor: |
| | (*) | \ )) | Christopher Baker 1:18/14 |
| |__U__| / \// | |
| _//|| _\ / | |
| (_/(_|(____/ | |
| (jm) | Newspapers should have no friends. |
| | -- JOSEPH PULITZER |
+----------------------------+-----------------------------------------+
| Submission address: FidoNews Editor 1:1/23 |
+----------------------------------------------------------------------+
| MORE addresses: |
| |
| submissions=> cbaker84@digital.net |
+----------------------------------------------------------------------+
| For information, copyrights, article submissions, |
| obtaining copies of FidoNews or the internet gateway FAQ |
| please refer to the end of this file. |
+----------------------------------------------------------------------+
ANOTHER YEAR, ANOTHER NO IC?
Table of Contents
1. EDITORIAL ................................................ 1
How about that ZEC Election process? ..................... 1
2. LETTERS TO THE EDITOR .................................... 2
NEW Opus Version 1.79 Available! ......................... 2
Response to BBS Week notice .............................. 2
3. ARTICLES ................................................. 4
New Beanie Babies Echo! .................................. 4
NOT the death of a friend! ............................... 4
4. COLUMNS .................................................. 6
Lock and Load: Guerilla Marketing for BBSes ............. 6
5. GETTING TECHNICAL ........................................ 8
FSC-0064 - InterDomain Message Identification ............ 8
FSC-0065 - Type 3 ASCII .................................. 12
FSC-0066 - Type 3 Binary ................................. 22
FSC-0067 - Proposal for Sensible New Kludge Lines ........ 24
6. WE GET EMAIL ............................................. 28
More security holes in Internet Explorer? ................ 28
7. NET HUMOR ................................................ 32
The Microsoft Restaurant ................................. 32
8. COMIX IN ASCII ........................................... 34
Animated ASCII? .......................................... 34
9. NOTICES .................................................. 45
Future History ........................................... 45
Action Alert for Privacy on the Internet ................. 46
And more!
FIDONEWS 14-18 Page 1 5 May 1997
=================================================================
EDITORIAL
=================================================================
Lots of fun and interesting stuff in today's Issue although I did not
receive the usual Z2 stats file this week from ZC2.
For those of you who still run BBSes, Opus has FINALLY released a new
version this week. Opus 1.79 is making the rounds and has also been
hatched into SDSOPUS file echo. For those of you who've never heard of
it, Opus was the first multi-function BBS/Mailer developed after Fido.
There is an announcement further down the page with sources.
Still no IC. [sigh]
C.B.
-----------------------------------------------------------------
FIDONEWS 14-18 Page 2 5 May 1997
=================================================================
LETTERS TO THE EDITOR
=================================================================
Sender: trev@guard.bbs.org
Date: Fri, 02 May 1997 01:10:38 +1000
From: Trev Roydhouse <trev@ibm.net>
Organization: Worldwide Opus Consortium
To: Bill Swisher <bswisher@micronet.net>,
Christopher Baker <cbaker84@digital.net>,
Eelco de Graaff <EELCO@humako.nl>,
Jim Barchuk <jbarchuk@worldnet.att.net>,
Joe Rowehl <jhrowehl@juno.com>,
Mike Burgett <mburgett@cmnsens.zoom.com>,
Peter Bruneau <pbruneau@ican.net>,
Rob Lerman <rlerman@treknet.gigo.com>,
Roger Dunk <roger@arcadiatech.com.au>, Ron Stalzer
<ron@futureone.com>, Ronald Bruintjes
<ronald.bruintjes@deimos.nl>,
Sue Blake <sue@welearn.com.au>
Subject: Opus v1.79
Last night, May 1st, a brick was hurled through the window with the
following scrawled note attached:
"On behalf of the Opus Covert Action Committee and the Not Ready for
Mainframe Players, Sydney and Elsewhere ...
OEXE179.ZIP Opus v1.79 Main executables
OUTIL179.ZIP Opus v1.79 Utility files
OMAKE179.ZIP Opus v1.79 Installation kit
OSOM179.ZIP Opus v1.79 Sysop Operations Manual
OTEC179.ZIP Opus v1.79 Technical Reference Manual
File requestable from 3:3/113 aka 3:711/401 and 1:1/113.
Available on the WWW at http://www.suburbia.com.au/~trev
Anonymous FTP at ftp://ftp.fido.net/pub/bbs/ibmpc/opus
FTP by mail by sending email to opsu179@deimos.nl
Guido & Nunzio."
Cheers, TREV.
-30-
-----------------------------------------------------------------
From: newsbob@kwhn.com
To: -david.chord@cobra.galaxy.gen.nz, cbaker84@digital.net
Date: Mon, 28 Apr 1997 16:05:06 -0700
Subject: International BBS Week
FIDONEWS 14-18 Page 3 5 May 1997
Hi, David!
Saw your note in Fidonews about International BBS Week. Thought I'd
let you know I'll do what I can to help. I'm a Broadcast Journalist
by trade, author of the BBS Guide to Public Relations, a BBS user (not
a sysop), and few weeks ago I started writing a column on BBS
Marketing for Fidonews.
I can lend my expertise to anyone who wishes it, but I have no money
to spend (a wife and three kids pretty well take care of that). I'm
drawing up a draft news release that Sysops can adapt for their own
use. I should have it done by Wednesday (April 30).
Warmest regards,
Robert Parson
Fidonet 1:3822/1
Internet newsbob@ipa.net
-----------------------------------------------------------------
FIDONEWS 14-18 Page 4 5 May 1997
=================================================================
ARTICLES
=================================================================
New Beanie Babies Echo
by Ronnie Toth, 1:135/71
BEANIE BABIES * BEANIE BABIES * BEANIE BABIES * BEANIE BABIES *
They're here! They're there! They're everywhere!
(If you can find them.)
And now the FidoNet Beanie Baby echo, BEANIES, is here too!
If you're into BEANIE BABIES, join the fun in the new BEANIES echo.
It's all about having fun with these adorable critters, and a forum
for Private Collectors to chat, exchange ideas and stories about
them, and trade, buy and sell them. Commercial pricing and
availability is NOT permitted.
Links are available at 1:135/71 until the echo is backboned, which
we hope will be very soon.
A netmail to the above FidoNet node will link you up immediately!
Ronnie Toth
FidoNet 1:135/71
Tagname: BEANIES
-----------------------------------------------------------------
NOT the death of a friend!
by Louie Gonsalves, 1:2808/100, sysop@phosphor.datasync.com
----------------------------------------------------------------
NOT the death of a friend!
I was saddened by the news of Clay Tannacore's (1:372/4) dog's
death. However, it is my opinion that Clay let his companion of
years, Fido, to die.
You see, Fido *is* a sick little pup... but he can't get better if
we don't help him. Fido is getting old, true, and there are other
animals in town that are better looking, and bigger... but Fido is
not ready for the gas just yet.
Fido is NOT dying. He's going through a rebellious period. You
remember those, right? When you decided that enough was enough, and
rebelled against your parents, your school. Long hair, loud,
strange music.
Fido is rebelling. It is rebelling against those that for so long
FIDONEWS 14-18 Page 5 5 May 1997
have ignored him. Fido is trying to get attention, and frankly, he
needs all of it.
Fido can be nursed back to health. The first thing that must be
done is make his masters realize that his last proper training was
done in 1989... his masters must realize that no longer dogs run at
300 bits per second. His masters MUST realize that things have
changed.
Only us, the folks that have taken Fido as a friend can help our
sick dog's masters realize all that.
Netmail the masters, email them, send them letters, what have you.
The masters:
Bob Satti (Z1C)
David Nugent (FTSC Chair)
And all the RC's and NC's.
AND MOST IMPORTANTLY: ALL THE NODES.
It is time for action. Or Fido will die.
Or will it?
-----------------------------------------------------------------
FIDONEWS 14-18 Page 6 5 May 1997
=================================================================
COLUMNS
=================================================================
Lock and Load: Guerilla Marketing for BBSes
Robert Parson 1:3822/1
I've spent the last twenty years writing for a living. You'd think
I'd know by now that I shouldn't entirely trust my spell checker when
proofreading articles. But that's what I did last time. And of
course, I found three errors when it was published in Fidonews. (I
checked, and they were indeed my mistakes, not the fault of Editor
Chris Baker's). I've learned my lesson.
I know I promised we would discuss how to deal with journalists today.
But the sun is out, the temperature is fairly warm and I need to whack
the grass. Instead, we'll take our modems for a walk. Anything to
get out of mowing.
Good word of mouth is the key to growth. But in order to get good
word of mouth, you have to get the word out in the first place. Last
time, we talked about writing news releases. While that's a good
start, you can't rely on getting published or aired. You have to find
other ways to get the word out.
A prime example of this is Apple Computer. In the early to mid '80s,
they came out with the revolutionary Macintosh. But they didn't rely
on getting good press. Apple was out beating the bushes, scraping for
every possible user. Contrast this with the Amiga. Another
incredible system. They also got good reviews in the media. But it
failed, in large part, because Commodore didn't proselytize (Apple is
down, but I wouldn't count them out quite yet).
So where does this fit in with your BBS?
If you answered "Get out of the house" you win the grand prize.
Sure, you will likely get some new callers, or attract a few old ones
who haven't called in a while, by advertising your BBS on other BBS in
the area. But you are preaching to the converted.
What we're looking for is fresh blood. We're going hunting. (How
many different metaphors can I sneak into this article?)
Today, I want you to procrastinate. You can put off for another day
adding yet another door game to the BBS, or tweaking the color in the
bulletins. Grab your business cards, put on some shades and hit the
road.
Amazingly enough, there are people EVERYWHERE! Everytime you turn
around, THERE'S ANOTHER ONE! Okay, I'm being facetious here, but the
point is you are going to have to get out and find new potential
callers. And springtime is the perfect time to find them.
Your Chamber of Commerce probably publishes a monthly calendar of
FIDONEWS 14-18 Page 7 5 May 1997
events or knows where to find one. Try to get on their mailing list.
It may not be possible to be placed on the mailing list unless you are
a member, which is quite expensive. Worst case: you'll have to go
down to the Chamber offices and get one.
Right about now there are little arts and crafts shows popping up all
over the place. There are civic groups such as the Rotary and
Exchange Clubs. Kids groups such as the Boy Scouts or school
carnivals. We're getting set for the summer parade season. Later
this year, county fairs. If there is some kind of public event going
on, you have an opportunity to invite new folks to call your BBS.
Make yourself available.
Steve Prado, the Sysop of my friendly neighborhood BBS (Jackalope
Junction 1:3822/1), has visited with the local Genealogical Society to
talk about the genealogical echos he carries and how useful they would
be for people researching their ancestors.
In many cases, you can get involved in something at no cost. Civic
groups are always looking for speakers and could be an easy mark. You
may have to pop a few bucks for some events, such as a table at a
county fair or an entry in a parade (now that's something I'd like to
see: a float for a BBS. Maybe something like those flying creatures
in the Macy's parade).
If you have an annual picnic for users, invite the local media to come
around.
Now suppose you run into someone that doesn't know how to do anything
other than call their local Internet Service Provider or one of the
commercial services. Make sure you are well versed enough in Windows
Terminal to at least tell them how to log on. It probably couldn't
hurt to create a little fact sheet, or maybe even give them a disk
that has the appropriate configuration (if you're like me, you've got
disks to burn). Once they get on, then you can get them set up with
other comm programs and/or offline readers.
No. This is not easy work. But you can't expect users to come
running when they don't know you even exist.
So stop reading right now and head out the do--*
Hey! Where'd everybody go!?
Robert Parson
-----------------------------------------------------------------
FIDONEWS 14-18 Page 8 5 May 1997
=================================================================
GETTING TECHNICAL
=================================================================
[This is part of the continuing series of FidoNet History publishing
all of the FTSC Standards and Proposals. These docs have been
reformatted to 70 columns where required and Node and phone numbers
may be outdated.] Ed.
Document: FSC-0064
Version: 007
Date: 10-May-1992
InterDomain Message Identification, Gating,
Reply Linking and Addressing
Jamie Penner
1:153/1025
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r)
community, and requests discussion and suggestions for
improvements. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Copyright (C) 1990, 1991, 1992 by Jamie Penner
All Rights Reserved
Originally written: Sept 3, 1990
Revised: November 12, 1990
Revised: June 23, 1991
Revised: August 26, 1991
Revised: January 22, 1992
Revised: February 4, 1992
Revised: February 12, 1992
Use of this proposal is encouraged and permitted by the author without
further notification in any software which is being written to conform
to FTSC specifications.
Suggestions and discussion are strongly encouraged. The author may
be reached at:
jamie.penner@f1025.n153.z1.fidonet
jamie.penner@f0.n24.z24.signet.admin
Echomail Basics:
All echomail passing through an interdomain echomail gateway
must have all information in the message header changed to
reflect the proper address of the domain in which the messages
are entering. The PATH and SEEN-BY lines should also reflect
FIDONEWS 14-18 Page 9 5 May 1997
these changes with only the SEEN-BY line containing any
information from the domain previous. This information shall
be the single address of the system passing the mail to the
gateway system. In addition, all gateway software should
recognize, by the message itself, whether it has EVER passed
through the gateway in the past. CRC records, SEEN-BY lines,
PATH lines and MSGID lines are not sufficient for this purpose
as most systems purge recorded logs of this info after a given
time.
InterDomain Echomail/Netmail Flags:
-----------------------------------
^ADOMORG:
usr.nme@[!][p.f.n.z.]network[.nid][[#nodelist_name][#point[x]]
^ADOMDES:
usr.nme@[!][p.f.n.z.]network[.nid][[#nodelist_name][#point[x]]
These lines would be a complete domain signature for any user
on any system in any FTN network.
The DOMORG line would be the actual origin information of the
user and system sending the information.
The DOMDES line would be the actual destination information of
the recipient user and system.
There are essentially two variations to the domain signature.
The ! immediately following the @ denotes a Type B, otherwise
defaulting to Type A.
Type A:
e.g. jamie.penner@f1025.n153.z1.fidonet
This has the complete FTN information needed for any
processor to send the message.
Type B:
e.g. jamie.penner@!signet.admin#ic.signet
The ! immediately preceeding the network signifies
that no FTN information is available but the
information after the # will give the name of the
system as denoted in the nodelist for that network.
This way, processors can be designed in a fashion that
they can look up the system name. Should this be
going to a point, the domain may be:
jamie.penner@!signet.admin#ic.signet#point
If I have two points and I want to send it to a
different point, I might use:
jamie.penner@!signet.admin#ic.signet#point2
FIDONEWS 14-18 Page 10 5 May 1997
The domain identifier in a Type B signature can be
further used for further locating a system if needed.
In both signature types, the nid (network identifier)
is optional (eg fidonet.org or signet.admin - only the
first field actually identifies the network name).
This information is completely dependant upon each
domain. For example I might send this:
rob.macare@!signet.eur.r331#maasstad.bbs
This kind of structure would get the message to the
right system. If there was two of the same system in
Region 331, I could use:
rob.macare@!signet.eur.n4601#maasstad.bbs
This format of domain signatures is provided solely for
compatibility purposes to provide software developers with a
platform on which they can structure new programming
techniques and can be used in conjunction with the other flags
as laid out in this document.
# GateOrigin: zzz:NNN/nnn.ppp@dmn (note leading space)
This line is currently inserted into all stripped down
echomail passing through interdomain gateways by GateWorks.
This allows the message overhead to be cut down by properly
replacing the origin line for users to read in the text yet,
not creating a second full originline. This line shall be
added immediately before the tearline with a single blank line
following it.
e.g. # GateOrigin: 24:24/0.0@signet
^AGATECHK: zzz.NNN.nnn.ppp [zzz.NNN.nnn.ppp] [zzz.NNN.nnn.ppp]
Any echomail passing through a particular gateway should have
this line inserted at the beginning of the message text.
Everytime the message passes through another echomail gateway,
the address would be added to the line. This way, if a
message passes back through with the same ID, it is a known
duplicate and can be vaporized.
e.g. ^AGATECHK: 24.24.0.0 8.8.7001.0
^AMSGORG: <originating-address> <originating-ID>
The MSGORG line keeps a standard original address and message
id in the message for reply, identification, dupe checking,
and origination purpose. This line would vanish and be
replaced with the necessary lines if passed through a gateway.
e.g. ^AMSGORG: 24:24/0.0@signet 0123456789abcdef
The originating ID is no different than other 16 bit IDs being
generated. It must be unique in a sense that no other
message originating from that system will have the same number
FIDONEWS 14-18 Page 11 5 May 1997
(at least within a short time span).
^AGATEWAY: <zonegate-address>
This field is inserted by the packer. The user-defined
zonegate fields give the message its destination to the
zonegate and may be routed through whatever channels to get
there.
e.g. ^AGATEWAY: 1:153/1025.0@fidonet.org
^GRPLY: <zonegate-address> <originating-address>
When replying to a message, this line would be looked up so as
to find the actual message destination and give the system its
zonegate information. If the message passes through a
gateway, the MSGORG line would be removed upon insertion of
this line.
e.g. ^AGRPLY: 1:153/1025@fidonet.org 24:24/0.0@signet
An example echomail message from 24:11/7777.0@signet across the domain
to 1:153/85.0@fidonet should read:
To: Bill Herringshaw, 1:153/85.0@fidonet
From: Jamie Penner, 1:153/1025.0@fidonet
Subject: Testing
AREA: TEST_ECHO
^AGATECHK: 24.24.0.0
^AGRPLY: 1:153/1025.0@fidonet 24:11/7777.0@signet
^ADOMORG: jamie.penner@f7777.n11.z24.signet.admin
^ADOMDES: bill.herringshaw@f85.n153.z1.fidonet.org
^APID: RA 1.01
Hi Bill, just testing out this new software
# GateOrigin: 24:11/7777.0@signet
--- GateWorks v4.00a
* Origin: Home of GateWorks!! (1:153/1025.0)
SEEN-BY: 24/0 153/1025
^APATH: 153/1025
An editor programmed to handle these fields would recognize GRPLY line
and know that the message had passed through a gateway. An echomail
reply would simply pass through the gateway. If a netmail reply was
required, this would be the reply message:
To: Jamie Penner, 24:11/7777@signet
From: Bill Herringshaw, 1:153/85.0@fidonet
Subject: Testing
^AGATEWAY: 1:153/1025.0@signet
^AGRPLY: 24:24/0.0@signet 1:153/85.0@fidonet
^ADOMORG: bill.herringshaw@f85.n153.z1.fidonet.org
^ADOMDES: jamie.penner@f7777.n11.z24.signet.admin
FIDONEWS 14-18 Page 12 5 May 1997
> Hi Bill, just testing out this new software
Got it here!
via InterMail @ 24:24/0.0@signet, 17:23:17 22 Jan 92
The mailer and/or packer would check for the GATEWAY flag and route
the message through that gateway.
Under this method of flags, all systems in all domains should have
access to the ability to reply via netmail to a system in a different
domain. In addition, by following this specification, all
interdomain echomail should be clean and troublefree. This
eliminates the need for some of the other ^A lines being used.
It is the intention that all addresses in these flags may use the 5d
addressing scheme, or either of the Type A or B domain signatures.
The software should be written to determine the type of address used
and manipulate the situation accordingly.
The following list of software may be incomplete but lists all
software currently available or under development using this spec:
GateWorks v4.00
ContactBBS
TOSSworks
FASTmail
<EOF>
-30-
-----------------------------------------------------------------
Document: FSC-0065
Version: 001
Date: 02-Aug-1992
Type 3 ASCII: A proposal
=========================
Mark Kimes
FidoNet 1:380/16
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r)
community, and requests discussion and suggestions for
improvements. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
FIDONEWS 14-18 Page 13 5 May 1997
Introduction:
============
This document describes a type of mail packet called type 3 ASCII.
Type 3 ASCII was designed with how Fidonet Technology Networks (FTNs)
handle mail (netmail, echomail, groupmail) in mind. It was also
designed to allow new distribution methods to be introduced. For
instance, it is possible to combine the best of echomail and groupmail
methods using type 3 ASCII packets. Finally, type 3 ASCII provides
reliability, space and speed advantages over the current mail packet
type 2 (see "Type 3 ASCII vs. Type 2" section below).
Packet structure:
================
(See "Definitions" section below for the meaning of any arcane
symbols)
Type 3 ASCII packets and archived bundles will ride existing transport
services (mailers) as attached files. Type 2 mail and type 3 ASCII
mail can both be sent to a node without conflicts. Naturally, the
receiving node should be able to process type 3 ASCII mail before it
is sent.
Type 3 ASCII packets are named <fileroot><.><3KT> when sent to a
remote site. Archives containing type 3 packets are named
<fileroot><.><3?A> when sent to remote sites. How these files are
stored or named locally is not within the scope of this document.
A type 3 ASCII packet consists of a packet header, followed by a
carriage return, followed by zero or more messages, followed by a NUL.
A type 3 ASCII message consists of a message header, followed by a
carriage return, followed by zero or more characters of message text,
followed by a NUL.
Diagramatically speaking,
(Text in brackets [] indicates optional data)
Type 3 ASCII packet: header
<cr>
[messagehdr1
<cr>
[text]
NUL
messagehdr2
<cr>
[text]
NUL
...
messagehdrn
<cr>
[text]
NUL
]
NUL
FIDONEWS 14-18 Page 14 5 May 1997
Breakdown:
=========
(See "Description of Fields" section below for information on
individual fields.)
Packet header:
=============
<3ASCII><cr>
From<cr>
[To]<cr>
Creator<cr>
[Password]<cr>
[Area]<cr>
[Tag1<sp>data1<cr>]
[Tag2[<sp>data2]<cr>]
...
[Tagn[<sp>datan]<cr>]
Message header:
==============
From<cr>
[To]<cr>
[Subject]<cr>
Date<cr>
[Area]<cr>
ID<cr>
[Ref]<cr>
[Tag1<sp>data1<cr>]
[Tag2[<sp>data2]<cr>]
...
[Tagn[<sp>datan]<cr>]
Message body:
============
Free-flowing, NUL-terminated text. May be composed of any
combination of ASCII characters > 31 (from the space character,
ASCII character 32, onward) and may include <cr> as a "paragraph
terminator." Systems which display message text should wrap long
lines to suit their application.
To be in compliance with this document, implementations must be
able to forward messages with at least 131,072 (128K) characters
of text (including the terminating NUL). Network politics may
outlaw messages of lesser size, but that is beyond the scope of
this document. If a compliant implementation encounters a message
longer than the 128K limit, it may truncate the message text
before forwarding. However, since it is easy to support messages
of a length limited only by available disk space, it is encouraged
that you do so and not impose artificial restrictions. The
purpose of this limit is to guarantee a minimum size that will be
passed, _not_ to restrict implementations to the "minimum."
FIDONEWS 14-18 Page 15 5 May 1997
Line feeds (ASCII character 10) are reserved and should not
normally appear in message text. Future plans call for their use
as "escape codes." So called "soft carriage returns" (ASCII
character 141) should not be contained in transmitted message text
unless the actual character itself is desired.
Tabs (ASCII character 9) should not be used in message text as
their use often leads to unreadable messages. How many spaces
should be used at a remote site to represent them?
Description of Fields:
=====================
Note: the maximum length of any field line (excluding, of course,
message text) is 255 characters including the terminating
<cr>. In practice, a bit of restraint should be practiced to
keep fields as small as possible. The maximum length of any
header is 32767 bytes, including terminating <cr>. In
practice, this limit should never be approached.
Date:
====
YYYYMMDDhhmmss<optional time zone>
where
YYYY = year with century, as in 1991 or 2001
MM = month, as in 01 to 12
DD = day of month, as in 01 or 28
hh = hour of day, as in 00 to 23
mm = minute of hour, as in 00 to 59
ss = second of minute, as in 00 to 59
<optional time zone> = offset from GMT in 15 min. increments
(i.e. "+4" (sans quotes) for GMT + one
hour)
All numbers are represented in decimal.
Samples: 19990419143200
(April 19, 1999 at 2:32:00 pm)
19921223020303+8
(December 23, 1922 at 02:03:03 GMT + 2 hours)
The Date field is required.
From and To:
===========
The From field contains the writer's name followed by a valid FTN
network address. For the purposes of this document and current
implementations of type 3 ASCII packets, the format of a valid FTN
network address is:
Domain<#>Zone<:>Net</>Node[<.>Point]
where
FIDONEWS 14-18 Page 16 5 May 1997
Domain is a text string from 1 to 8 characters in length
containing only alphabetical [A-Za-z] and/or numerical [0-9]
characters.
Zone is a decimal number from 1 to 65533.
Net is a decimal number from 1 to 65533.
Node is a decimal number from 0 to 65533.
Point is a decimal number from 0 to 65535 (may be omitted if
0).
The FTSC or whatever body guards tech specs may change this
definition in the future as it sees fit.
The full format of a type 3 ASCII From or To field is:
[User Name<@>]Domain<#>Zone<:>Net</>Node[<.>Point]
If User Name<@> is missing, assume user name is Sysop. User Name
may be composed of any combination of ASCII characters > 31 (from
the space character, ASCII character 32, onward) excluding <@>.
If <.>point is missing, assume point 0.
The To field contains the recepient's name and address as above.
The To field is optional. If it is missing, message/packet is
broadcast mail (no definite, single recipient). In this case
there must be an area (if the To field is omitted in the packet
header, there must be an area in the packet header and all
messages must be broadcast mail for that area. If omitted in the
message header, the message or the packet must have an area and
message may be displayed as being addressed to "All@Anywhere"). A
<cr> must still be present as a "space holder." In broadcast
mail, it is permissible to give only the name of the user (without
following address) in a message header; however, the name must end
with <@> (to distinguish it from an address with no User Name).
Note this means a single broadcast mail packet can be sent to many
nodes.
The From field is required.
In the case of From and To fields in the packet header,
[user name<@>] is probably unimportant.
In the interests of saving space, domains such as "Fidonet.org"
should be replaced with just "Fidonet," as the ".org" modifier has
no meaning to an FTN site. Domains should be treated case
insensitively.
Sample: John Doe@Fidonet#1:380/16
(User "John Doe" in domain "Fidonet" zone 1 net 380
node 16, implied point 0)
Creator:
FIDONEWS 14-18 Page 17 5 May 1997
=======
Name of the product that produced the packet. This field is
required.
Password:
========
A password to use for security. This field is optional. If
omitted, a <cr> must still be present as a "space holder." How
this field is used is implementation-defined.
Subject:
=======
The subject field should contain text hinting at the subject of
the message text. It may be composed of any combination of ASCII
characters > 31 (from the space character, ASCII character 32,
onward). The subject field is optional. If omitted, a <cr> must
still be present as a "space holder."
Area:
====
Area fields consist of a string of alphanumeric characters plus
space, "-" and "_" (ASCII characters 32, 45 and 95 respectively).
Area fields are optional with the following consequences:
If the area field in a packet header is missing, the messages in
the packet will have area fields present for broadcast mail,
omitted for personal mail.
If the area field in a packet header is present, all the
messages in the packet will be broadcast mail for the area
specified in the packet header. The message area fields will
not be present.
When an area field is omitted, a <cr> must still be present as a
"space holder."
ID:
==
An ID consists of the originating address of the message plus a
serial number, in the form:
origaddr<sp>serialno
The originating address should be specified in a form that
constitutes a valid return address for the originating network.
If the originating address is enclosed in double-quotes, the
entire string between the beginning and ending double-quotes is
considered to be the orginating address. A double-quote
character within a quoted address is represented by by two
consecutive double-quote characters. The serial number may be
any eight character hexadecimal number, as long as it is unique
FIDONEWS 14-18 Page 18 5 May 1997
- no two messages from a given system may have the same serial
number within one year. The manner in which this serial number
is generated is left to the implementor.
Notes: The "old" format of
Zone<:>Net</>Node[<.>Point][<@>Domain]
for FTN addresses is allowed in this field.
The address portion of the ID may be omitted if it is
exactly the same as the From address (less User
Name<@>). In this case, the ID field should begin with
a space followed immediately by the serial number.
In the case of foreign network addresses, this address
gives you the "true" origin, and the From address gives
you the gateway at which the message entered FTN
territory. This allows you to gate replies to
"foreign" sites.
Samples: some.other.net.addr ABCDEF12
12345ABC
(Assume From field of second sample contained
"Joe Blow@Fidonet#1:380/16",so complete constructed ID would
be Fidonet#1:380/16 12345ABC
Note address would be copied exactly from the From field.)
The ID field is required.
Ref:
===
A Ref consists of the ID of the original message to which this
message refers (usually as a reply).
Sample: Fidonet#1:380/16 12345ABC
(would reference the second ID sample above)
The reference field is optional. If omitted, a <cr> must still be
present as a "place holder."
Tag<sp>Data:
===========
The tag+data lines are type 3 ASCII's method of automatically
expanding its headers. A tag consists of a sequence of uppercase
alphabetic (A-Z inclusive) and/or numeric sequence of characters
and possibly a hyphen (ASCII character 45) and/or underline (ASCII
character 95), up to 12 characters in length (a name). A tag name
can be followed optionally by a space (ASCII character 32) and
data. Data may be composed of any combination of ASCII characters
> 31 (from the space character, ASCII character 32, onward).
To aid in developer experimentation with tags in type 3 ASCII, it
is guaranteed that the FTSC or whatever body guards tech specs
FIDONEWS 14-18 Page 19 5 May 1997
will never "canonize" a tag beginning with the two characters "X-"
(ASCII character 88 followed immediately by ASCII character 45).
Thus, tags may use this combination before tag names to guarantee
uniqueness.
Experimental tags may be stripped by conforming implementations
during message passthrough. This helps prevent experimental tags
from escaping from test sites.
Samples (tag names are invented):
FOLLOW AFILEN.AME
X-TAG SOMEDATA
LONETAG
Tag<sp>data fields are optional and may be completely omitted when
creating a packet. Exception: all tag<sp>data fields except,
possibly, experimental fields, should be passed through with a
message being forwarded.
Predefined tags:
===============
Tag Where Data Meaning
--- ----- ---- -------
PRIV Msg Hdr None Message is private
FOROK Pkt Hdr None Packet may be forwarded
without unpacking -- all
messages are
to the To: address in the
packet header
Type 3 ASCII vs. Type 2:
=======================
Type 3 ASCII saves between 6% to 11% in raw packet size over type 2
(using Tiny Seenbys with the type 2 packets to make the test as fair
as possible), depending on how area tags for echos are used in the
type 3 ASCII packet (in packet header vs. message headers). 7%
smaller would be the norm for the way we do echomail business now.
The tests conducted were most unscientific but should be close to
everyday echomail-oriented reality.
Compressed packets are a slightly different story. Type 3 ASCII
compresses the same as type 2 when using area tags for echos in the
message headers. Type 2 compresses approximately 2.5% better when
area tags are used in the type 3 ASCII packet headers instead. Either
way, compressed type 3 ASCII packets are smaller than comparable type
2 packets due to the smaller raw packet size. Even compression ratios
would be the norm for the way we do echomail business now.
Type 3 ASCII imports between 2% to 5% faster (depending on algorithms
used). There is no discernable difference on export. Keep in mind
that this particular test has too many variables (software, hardware,
relative efficiency of code, etc.) to be considered a real benchmark.
Most of the speed savings is in not having to process SEEN-BY and PATH
FIDONEWS 14-18 Page 20 5 May 1997
lines. The lack of end-of-text control information is a real boon.
Type 2 has no method for reliably obtaining the full 5-D origin
address of a message. Type 3 ASCII provides a reliable method of
obtaining full origin address information for both the true origin (in
whatever network) and the gateway which brought the message into FTN
territory (if from a foreign network). This means that even if a
message originated in a network with which your software has no idea
how to communicate, you can still send a reply to an FTN node for
gating.
Type 2 has no reliable method for stopping dupes. Type 3 ASCII has a
mandatory ID field, very similar to type 2's optional MSGID, which can
be used for reliable dupe checking.
Type 2 echomail has control information scattered throughout the
message body, including SEEN-BY and PATH information at the end of the
message. This causes problems for developers, who often opt for
fixed-length buffers and arbitrary message length limits. All control
information for Type 3 ASCII is in the extensible message header.
Moreover, type 3 ASCII has generous set limits to which programmers
can work, and which users can therefore rely on.
Definitions:
===========
Except where noted otherwise, numbers are in decimal.
Although the ASCII character set is normally defined as being
limited to characters from 0 to 127, this document acknowledges the
existence of an eighth bit in most bytes and uses the term (loosely)
to mean characters from 0-255. Network politics may or may not
"outlaw" the use of some of those bytes; that is outside the scope
of this document.
Note: text in brackets [] indicates an optional field. See
"Definitions" section below for meaning of text in <>. See
"Description of Fields" section below for information on
individual fields.
Alphabetic:
==========
A-Z and a-z, ASCII characters 65 to 90 and 97 to 122 inclusive.
Numeric:
=======
0-9, ASCII characters 48 to 57 inclusive.
Alphanumeric:
============
All characters alphabetic and numeric.
Hexadecimal:
FIDONEWS 14-18 Page 21 5 May 1997
===========
0-9 and A-F (or a-f), ASCII characters 48 to 57 and 65 to 70 (or 97
to 102) inclusive.
NUL:
===
ASCII character 0.
<cr>:
====
Carriage return, ASCII character 13.
<lf>:
====
Line feed, ASCII character 10.
<sp>:
====
Space, ASCII character 32.
<@>:
===
@, ASCII character 64.
<#>:
===
#, ASCII character 35.
<:>:
===
:, ASCII character 58.
</>:
===
/, ASCII character 47.
<.>:
===
., ASCII character 46.
<3ASCII>:
========
The literal string "3ASCII" (not including quotation marks). This
text, followed by a <cr>, identifies a type 3 ASCII packet.
Implementations should *not* processes a file unless this
FIDONEWS 14-18 Page 22 5 May 1997
identifier is found on the first line, but should probably log the
occurrence.
<fileroot>:
==========
Eight alphanumeric characters that serve as the "root" of a
filename.
<3KT>:
=====
The literal string "3KT" (not including quotation marks).
<3?A>:
=====
The literal string "3?A" (not including quotation marks) with the
question mark (?) being replaced by a decimal integer from 0 to
9 (ASCII 48 to 57 inclusive).
Miscellaneous notes:
===================
jim nutt invented MSGIDs and REPLYids (ref. FTS-0009), which were
lifted very nearly whole to become IDs and Refs in this document. Tom
Jennings invented Fido and Fidonet <tm and stuff> from whole cloth and
RAM chips. NET_DEV's continual foolishness inspired me to do instead
of whine. Let's see if this cuts down on the whining...
-end-
Mark Kimes
1:380/16.0@Fidonet
(318)222-3455 data
542 Merrick
Shreveport, LA, USA 71104
-30-
-----------------------------------------------------------------
Document: FSC-0066
Version: 001
Date: 02-Aug-1992
Type 3 Binary: A proposal
==========================
Mark Kimes
FidoNet 1:380/16
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r)
FIDONEWS 14-18 Page 23 5 May 1997
community, and requests discussion and suggestions for
improvements. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
Preliminary specifications for type 3 binary mail format:
========================================================
Type 3 binary is a new form of mail for Fidonet Technology Networks
(FTN).
The basic unit of type 3 binary mail is a chunk. A chunk looks like
this:
+-------------------------------------+
| 2-byte integer length (type + data) | (A 2-byte integer is
+-------------------------------------+ a signed integer in
| 2-byte integer type | Intel format, giving
+-------------------------------------+ a length range of
| length - 2 of data | 2-32767 (0 is unused))
+-------------------------------------+
Predefined chunk types:
======================
Mnemonic VAL Where Data format
-------- --- ----- -----------
*EOP 0 PKT None
*FROM 1 BOTH FTN address in packet, name + FTN address in msg
TO 2 BOTH [FTN address in packet,] name + [FTN address] in
msg
SUBJECT 3 MSG Text
*ID 4 MSG 4-byte long integer
REF 5 MSG 4-byte long integer followed by FTN address
*DATE 6 MSG Packed date
ATTRIB 7 BOTH 2-byte integer (bit field)
PASSWORD 8 PKT Text
*PRODUCT 9 PKT Text
AREA 10 BOTH Text
*MSG 11 MSG 4-byte long integer (length of total msg)
TEXT 12 MSG Text
ORIG 13 BOTH origin address in native network's format
Notes:
-----
* = required field
Addresses are always in text.
An FTN address is in the form: domain<#>zone<:>net</>node<.>point
Name + address form is: user
name<@>domain<#>zone<:>net</>node<.>point Address in TO field may be
omitted for broadcast mail.
Defined attributes: 1 = PRIVATE in messages, Forward ok in pkt
header Packed date:
+---------------------------------------------------------+
FIDONEWS 14-18 Page 24 5 May 1997
| unsigned int year |
+---------------------------------------------------------+
| unsigned byte month (1-12) |
+---------------------------------------------------------+
| unsigned byte day-of-month |
+---------------------------------------------------------+
| unsigned byte hour |
+---------------------------------------------------------+
| unsigned byte minute |
+---------------------------------------------------------+
| unsigned byte second |
+---------------------------------------------------------+
| signed int gmt offset (15 min increments, -32767 = n/a) |
+---------------------------------------------------------+
A type 3 binary packet always begins with a single byte containing the
binary number 3. This is followed by the first chunk. A packet
"header" is composed of all chunks until the first MSG chunk is
encountered. A header should contain at least a FROM chunk, either a
TO chunk or an AREA chunk, and a PRODUCT chunk. PASSWORD, ORIG and
ATTRIB chunks might also be used.
The rest of the "specs" can be gleaned or clarified from the (working)
code included in the 3bcsrc.lzh archive. Personally, I don't think
this type of packet is much suited to FTN mail; too much of what we do
is text oriented. But here it is, to possibly get your tails moving
(or convince you that type 2 or type 3 ASCII is more what we need).
The main reasons for the 3binary archive are to show you I've done my
homework, to give working examples of the "other type" of type 3 mail
some folks advocate, and for comparison to type 3 ASCII and type 2.
Mark Kimes
fidonet#1:380/16.0
(318)222-3455 data USA
-30-
-----------------------------------------------------------------
Document: FSC-0067
Version: 001
Date: 02-Aug-1992
A Proposal For Sensible New Kludge Lines
========================================
Mark Kimes
FidoNet 1:380/16
Status of this document:
This FSC suggests a proposed protocol for the FidoNet(r)
community, and requests discussion and suggestions for
FIDONEWS 14-18 Page 25 5 May 1997
improvements. Distribution of this document is unlimited.
Fido and FidoNet are registered marks of Tom Jennings and Fido
Software.
MSGTO: This kludge line, together with a MSGID: kludge (see FTS-
0009), would provide full address specs for both the
originating and destination nodes of a netmail message (MSGTO
should _not_ be used in echo mail). Its format is simple:
^aMSGTO: <FTN address>
MSGTO (coupled with MSGID) would eliminate the need for the
INTL, FMPT, TOPT and DOMAIN kludges. A MSGTO kludge line
should go just below any MSGID and REPLY kludge lines. See
also discussion on FTN address representation below.
ASSOC: ASSOC introduces a filename that should follow the message (is
associated with the message). Format is, again, simple:
^aASSOC: <filename>
A message tosser would forward the file along with the
message, if so configured for the AREA: of the message
(assuming echomail) or other criteria. Paths would probably
not be useful in the <filename> field and should not normally
be included or used if found to be present. ASSOC kludge
lines should go below any addressing kludge lines.
SPTH: Clint Adams described this as a "5D, sensible order, top-of-
the-message path" line. I like that. Stands for "Sticky
PaTH." SPTH displaces the current PATH line. Instead of
being located at the bottom of the message, it's located at
the top of the message. Instead of being 2-D (net/node), it's
5-D (domain#zone:net/node.point). It's sticky like a normal
PATH line so that the size doesn't get outrageous. Because
it's 5-D instead of 2-D it can be used for dupe checking
(which a normal 2-D PATH line cannot; is 1/1 Fidonet#1:1/1 or
Dufusnet#2:1/1?). Because it's 5-D we would no longer have to
go through hideous gyrations when gating echo mail from one
domain to another; just let it flow. Using SPTH it becomes
trivial to cut SEEN-BYs down to Tiny Seenbys (only required
for backward compatibility with old mail processors that barf
without some SEEN-BYs, and to protect fully enclosed polygon
topology).
SPTH is to be used only in echo mail. It's format is
basically:
^aSPTH: <address> <address> ... <address>
SPTH lines, like PATH lines, contain only addresses of mail
processors that actually processed the message. SPTH lines
are specifically not sorted and are "sticky" so that they
carry the least amount of information that will convey a full
address when coupled with preceding addresses. For example,
if 1:380/16.0@Fidonet, 1:380/16.1@Fidonet,
1:380/100.0@Fidonet, 1:396/100.0@Fidonet, 2:4177/1.0@Fidonet
and 2:4177/1.0@Othernet processed a message, in that order,
you'd have:
FIDONEWS 14-18 Page 26 5 May 1997
^aSPTH: Fidonet#1:380/16 .1 100 :396 #2:4177/1 Othernet
Note that point 0 is assumed if missing and that punctuation
*precedes* an address element except in the case of a domain
change (and when the net element is the first change -- this
dictates that domain names begin with an alphabetical
character). This compacts SPTH entries as much as possible
for most typical topologies.
When an SPTH-aware processor forwards a message containing (a)
PATH line(s) but no SPTH line(s), it should create a new SPTH
line (or lines as required; SPTH lines shouldn't get longer
than 80 characters, including terminating carriage return)
containing "fleshed-out" addresses from the PATH line(s), then
add itself. If this is done at all zone/domain gates, the
SPTH will always be current even if intermediate nodes are not
SPTH-aware. In the event an SPTH-aware processor receives a
message containing both SPTH line(s) and PATH line(s), it
should concatenate the "fleshed-out" addresses from the PATH
line(s) to the SPTH line(s), then add itself. The PATH
line(s) may then be discarded from the message. When
exporting new messages, only a SPTH line should be created; no
PATH line should be generated. Tiny Seenbys should be added
at the end of the message for the reasons noted above.
Note that all the kludge lines above are in actual use and have been
for some time; they do work, and work as presented. Code is available
on request, but implementation is trivial (only SPTH takes any real
work at all).
FTN address representation:
==========================
The current convention for representing an FTN address has become:
zone:net/node[.point]@domain
I propose we change this to:
domain#zone:net/node[.point]
Why? It's all in one order, highest to lowest; it's consistent. "@"
is used, in the former method, in a way rather opposed to normal usage
in network addressing.
While we're on the subject of domains, let's knock off using
"fidonet.org" in FTN addresses. That only means something in
Internet. It's going to gum up the works for FTN domains, where we'll
want things like "fidonet.eu" to mean Fidonet Europe some day.
I'm done now.
Mark Kimes
Fidonet#1:380/16
(318)222-3455 data
FIDONEWS 14-18 Page 27 5 May 1997
-30-
-----------------------------------------------------------------
FIDONEWS 14-18 Page 28 5 May 1997
=================================================================
WE GET EMAIL
=================================================================
From: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
To: "Baker, Christopher" <cbaker84@digital.net (Christopher Baker)
Date: Sat, 03 May 97 11:50:28 -0600
Reply-To: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
Subject: Fwd: Norton/Microsoft Security Breach (Long)
==================BEGIN FORWARDED MESSAGE==================
>Sender: rkodner@popd.ix.netcom.com
>X-Mailer: Windows Eudora Pro Version 3.0.1 (32)
>Date: Sat, 03 May 1997 11:29:30 -0500
>To: network2d-l@austin.onu.edu, solosez@abanet.org,
>lawtech@abanet.org >From: Ross Kodner <rkodner@ix.netcom.com>
>Subject: Norton/Microsoft Security Breach (Long)
>Sender: owner-solosez@mail.abanet.org
Holy Moley! The latest chapter in the Internet Explorer Security Hole
of the Day saga from www.winsources.com:
Norton Utilities, Internet Explorer Combo Puts Systems in Harm's Way
(by Jesse Berst)
Combination of NU 2.0 for Windows 95 and Internet Explorer 3.x
highlights security weaknesses in ActiveX controls
Your worst fears have come true. McAfee Associates has discovered, and
Windows Sources has confirmed, a flaw in the underlying architecture
of Internet Explorer and Windows 95 that renders users of the Web
vulnerable to a range of catastrophes. These disasters range from an
involuntary reformatting of your hard drive to breach of information
once thought to be secure.
Users running the combination of Windows 95, Internet Explorer 3.x,
and Symantec's Norton Utilities 2.0 for Windows 95, one of the most
popular and widely used software utility products for Windows 95, are
currently known to be at risk. (In the spirit of disclosure, users
should be aware that McAfee Associates and Symantec Corp. are
competitors in the utilities and anti-virus software market.)
Neither Verisign's Authenticode (which is built-in to Internet
Explorer) or recent IE security patches posted on Microsoft's Web site
offer any protection. According to Reston, VA-based research firm PC
Data, 143,559 licenses have been issued for Norton Utilities, and
125,825 users have Internet Explorer. The number of users who have
actually deployed both at the same time is unknown.
The problem lies in TUNEOCX.OCX, a core component of Norton Utilities'
System Genie. When installed, this OCX is marked as scriptable, which
allows ActiveX-aware Web page scripts to make use of this ActiveX
control. This control supports a "run" option that allows the script
to execute any local application, such as the FORMAT or FTP (net-based
file transfer) commands.
FIDONEWS 14-18 Page 29 5 May 1997
Windows Sources analysis of Norton Utilities found that this component
essentially granted unauthorized access to any system resource that is
normally accessible from the desktop itself. As a result, any
programmer with access to one of Microsoft's scripting tools
(VBScript, MS C++, Visual C++, Visual J++, etc.) can leverage this
control to perform any task on the target system -- unbeknownst to the
system's user.
For example, a Web page hacker could build a page that, when viewed by
Internet Explorer, runs a few lines of VBScript code that wipes out a
hard drive, installs a Trojan horse, or invokes file transfer and
directory utilities to retrieve confidential information. Worse yet,
all these tasks could be performed in the background without the user
ever knowing what's happening to their system.
Verisign's Authenticode, billed by Microsoft as a protection mechanism
built into Internet Explorer that allows users to intervene before
potentially dangerous code is downloaded, is ineffective against this
sort of invasion. That's because Authenticode watches for software
that's about to be downloaded, but not VBScripts that activate
software components that are already installed on the system (e.g.:
TUNEOCX.OCX).
Although the aforementioned combination of software is currently the
only known group at risk, there could be other combinations of
application and ActiveX-based browsers that are equally vulnerable.
The smoking gun in this example is Norton Utilities 2.0, but NU simply
exposes an important and oft-debated feature/weakness in Microsoft's
ActiveX architecture. Other products that are already deployed en
masse could be "offering" the same service to those with malicious
intent.
In tests, Windows Sources found the same combination running on
Windows NT (including the NT-based version of NU) to be safe.
HealthyPC, another PC tune-up utility from Symantec also tested safe
at Windows Sources.
SYMANTEC, MICROSOFT RESPOND
According to Symantec Sr. Product Manager Tom Andrus, "It is a
problem. We know how serious it is. But we think that it is very
uncommon. To our knowledge, there are no Norton Utilities users in the
world that have run into this."
To Symantec's credit, Norton Utilities 2.0 includes a feature called
Live Update that automatically updates a user's system with new
drivers and software, when that system is connected to the Internet.
"We've worked out a fix and it's in the hands of our quality assurance
group right now," said Andrus. "By this afternoon, a fix will be up
on-line so that any PC that connects to the Internet while running
Live Update will be automatically fixed so as not to allow this
again." For more information, users can go to www.symantec.com.
Microsoft sought to put this situation in a more positive light,
highlighting the ability to quickly fix the problem rather than the
FIDONEWS 14-18 Page 30 5 May 1997
problem itself.
"The fact that [Symantec] could fix it so quickly is a major testament
to the flexibility of the ActiveX architecture," said Microsoft
Program Marketing Manager Cornelius Willis. "Yes, this is a threat but
there are so many threats. Vendors can mark off-the-shelf software
safe-to-script or not-safe-to-script. For example, Microsoft Excel is
marked not-safe-to-script because it has access to system resources.
Therefore Excel is invulnerable to such attack. VBScript and
JavaScript will only instantiate controls that are marked safe-to-
script and this was one of them."
"Plug-ins (a la Netscape's Navigator) have no digital certificates or
safe-to-script toggles and we feel that ActiveX is the only
architecture that offers any kind of accountability for downloaded
software," added Willis.
But, in Windows Sources tests of the Norton Utilities example, ActiveX
offered no opportunity to engage this accountability since it involved
a script acting against an already installed component (from shrink-
wrapped software) rather than the downloading of software.
SOLVING THE PROBLEM
There are preventative measures users can take to protect themselves.
Following one of these five steps will help protect your system from
the effects of the toxic software combination:
1) Download the patch from Symantec
2) Uninstall Norton Utilities
3) Disable support for ActiveX-scripting in Internet Explorer
4) Switch to a non-ActiveX-based browser such as
Netscape's Navigator,
5) Stay off the Net.
Be warned also that, going forward, addressing the problem through
Norton Utilities is not a complete fix. Downloading a patch or
uninstalling NU will not protect a system if other equally vulnerable
software is already installed. Additionally, disabling ActiveX
scripting or switching to a non-ActiveX browser may disable other web-
and ActiveX-based applications. Manually disabling Norton Utilities
without uninstalling it is unlikely to safeguard the system and
therefore is not recommended.
Corporate sites that use Windows 95's centralized policy management
features may also disable the ability to run Internet Explorer
throughout their local area networks. Unfortunately, the same policy
management feature doesn't provide centralized management of Internet
Explorer's run options, making it impossible to reach across corporate
nets and just disable support for ActiveX scripting.
Finally, for those who are really paranoid, switching to Windows NT
might be one last measure of assurance. Under Windows NT, software
cannot be executed without a security token that authenticates the
code's privileges to the system's resources. Such code usually
inherits the rights of the user sitting at the machine, thus limiting
FIDONEWS 14-18 Page 31 5 May 1997
intruding code to only the resources the user has rights to access.
Provided that the user doesn't have administrator-level rights, the
malicious code's impact could be far less catastrophic.
For further discussion on this important issue, ask questions and
express your opinions in the ActiveX Expert Answers Forum."
Ross
______________________________________________________
Ross L. Kodner, Esq. Voice: 414-476-8433
MicroLaw, Inc. FAX: 414-476-8461
825 S. 60th St. E-Mail: rkodner@ix.netcom.com
Milwaukee, WI 53214
Web1: http://www.microlaw.com
Web2: http://www.wisbar.org/legalres/rosslegal.html
Web3: http://www.microlaw.com/kodner/index.htm
ABA LPM "Network 2d" Ass't Editor Always Seeking Great Articles!
______________________________________________________
===================END FORWARDED MESSAGE===================
-30-
-----------------------------------------------------------------
FIDONEWS 14-18 Page 32 5 May 1997
=================================================================
NET HUMOR
=================================================================
From: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
To: "Baker, Christopher" <cbaker84@digital.net (Christopher Baker)
Date: Thu, 24 Apr 97 11:31:50 -0600
Reply-To: "Mike Riddle" <mriddle@monarch.papillion.ne.us>
Subject: Fwd: The Microsoft Restaurant
==================BEGIN FORWARDED MESSAGE==================
"If restaurants functioned like Microsoft:
Patron: Waiter!
Waiter: Hi, my name is Bill and I'll be your Support Waiter. What
seems to be the problem?
Patron: There's a fly in my soup!
Waiter: Try again, maybe the fly won't be there this time.
Patron: No, it's still there.
Waiter: Maybe it's the way you're using the soup; try eating it
with a fork instead.
Patron: Even when I use the fork, the fly is still there.
Waiter: Maybe the soup is incompatible with the bowl; what kind
of bowl are you using?
Patron: A SOUP bowl!
Waiter: Hmmm, that should work. Maybe it's a configuration
problem; how was the bowl set up?
Patron: You brought it to me on a saucer; what has that to do with
the fly in my soup?
Waiter: Can you remember everything you did before you noticed
the fly in your soup?
Patron: I sat down and ordered the Soup of the Day!
Waiter: Have you considered upgrading to the latest Soup of the Day?
Patron: You have more than one Soup of the Day each day?
Waiter: Yes, the Soup of the Day is changed every hour.
Patron: Well, what is the Soup of the Day now?
Waiter: The current Soup of the Day is tomato.
FIDONEWS 14-18 Page 33 5 May 1997
Patron: Fine. Bring me the tomato soup and the check. I'm running
late now.
[Waiter leaves and returns with another bowl of soup and the check.]
Waiter: Here you are, Sir. The soup and your check.
Patron: This is potato soup.
Waiter: Yes, the tomato soup wasn't ready yet.
Patron: Well, I'm so hungry now, I'll eat anything.
[Waiter leaves.]
Patron: Waiter! There's a gnat in my soup!
----------
The check:
Soup of the Day . . . . . . . . . . . $ 5.00
Upgrade to newer Soup of the Day. . . $ 2.50
Access to support . . . . . . . . . . $10.00
Editors Note:
Bug in the soup........included at no extra charge
(will be fixed with Tomorrow's soup of the day)"
:-)
Ross
______________________________________________________
Ross L. Kodner, Esq. Voice: 414-476-8433
MicroLaw, Inc. FAX: 414-476-8461
825 S. 60th St. E-Mail: rkodner@ix.netcom.com
Milwaukee, WI 53214
Web1: http://www.microlaw.com
Web2: http://www.wisbar.org/legalres/rosslegal.html
Web3: http://www.microlaw.com/kodner/index.htm
ABA LPM "Network 2d" Ass't Editor Always Seeking Great Articles!
______________________________________________________
===================END FORWARDED MESSAGE===================
-----------------------------------------------------------------
FIDONEWS 14-18 Page 34 5 May 1997
=================================================================
COMIX IN ASCII
=================================================================
--- Following message extracted from MENSANS_ONLY @ 1:18/14 ---
By Christopher Baker on Wed Apr 30 12:31:45 1997
From: Francois Thunus
To: All
Date: 29 Apr 97 20:16:00
Subj: Learning to dive (fwd)
======================================================================
* Forwarded by Francois Thunus (2:270/25.2)
======================================================================
Dear Friends, this is a work of art, that I hope will work on all
your screens.
Yours
Martin
Start scrolling down with the arrow key, and AS SOON AS
"** Start Hitting Spacebar Now **" appears on the bottom line of you
screen, start hitting the spacebar/page down slowly.
>>>
>>>
>>>
>>>
>>>
>>> o ___
>>> /|\ /___\______
>>>__/_\___/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>
>>> ** Start Hitting Spacebar Now **
>>>
>>>
>>
>>
>>>
>>> o ___
>>> /|\ /___\______
>>>___/_\__/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
FIDONEWS 14-18 Page 35 5 May 1997
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o ___
>>> |=/___\_______
>>>_____/>/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> |=___
>>> /|/___\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> /|\
>>> //_\\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
FIDONEWS 14-18 Page 36 5 May 1997
>>>
>>>
>>> o
>>> _/|\
>>> /_/_\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___/|\
>>> /___/_\_____
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ /|\
>>> /___\/_\____
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ /|\
>>> /___\_/_\____
FIDONEWS 14-18 Page 37 5 May 1997
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ /|\
>>> /___\__/_\_
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ /|\
>>> /___\____/_\
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ |=
>>> /___\______|
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
FIDONEWS 14-18 Page 38 5 May 1997
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___ o
>>> /___\__ |=
>>>_______/____|_ ---_>
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> ___ |=
>>> /___\______>
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> o
>>> /=
>>> ___ _>
>>> /___\___---
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
FIDONEWS 14-18 Page 39 5 May 1997
>>>
>>>
>>> o
>>> /=
>>> /
>>> ___
>>> /___\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> __o
>>> / \
>>> ___
>>> /___\_____
>>>_______/____|_ --
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ____o
>>> ___ \
>>> /___\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> __
FIDONEWS 14-18 Page 40 5 May 1997
>>> ___ \o
>>> /___\_______ \
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___ \
>>> /___\_______ \o
>>>_______/____|_ \
>>> |
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______ \
>>>_______/____|_ \
>>> | |o
>>> |
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_ \|
>>> | |
>>> | |o
FIDONEWS 14-18 Page 41 5 May 1997
>>> |~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> | \|
>>> | ' |..'
>>> |~~~~~~~~~~~~~~~~~~~/o'~~~~~~
>>>
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_ . .
>>> | . '. '
>>> | '.\/..'.
>>> |~~~~~~~~~~~~~~~~~~~~~~/,~~~~
>>> /o
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> | .'..''..
>>> | . .'.' '
>>> |~~~~~~~~~~~~~~~~~~~~~~;|/,~~
>>> _o/
>>>- /
>>>
>>>
FIDONEWS 14-18 Page 42 5 May 1997
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> | . .
>>> | ..'.'.
>>> |~~~~~~~~~~~~~~~~~~~~~~;,;~~~
>>> _o__/'
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> |
>>> | . .
>>> |~~~~~~~~~~~~~~~~~~~~~~~;~~~~
>>> o__// ''
>>>- //
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> |
>>> |
>>> |~~~~~~~~~~~~o~~~~~~~~~~~~~~~
>>> |\__
>>>- \
>>>
>>>
>>>
>>>
>>>
>>>
>>>
FIDONEWS 14-18 Page 43 5 May 1997
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> |
>>> | o
>>> |~~~~~~~~~/|\~~~~~~~~~~~~~~~~~~
>>> / \
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> |
>>> | o/
>>> |~~~~~~~~~/|~~~~~~~~~~~~~~~~~
>>> / \
>>>-
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> ___
>>> /___\_______
>>>_______/____|_
>>> | , CIAO in next mail!
>>> | o/
>>> |~~~~~~~~~/|~~~~~~~~~~~~~~
>>> / \
>>>-
>>>
>>>
>>>------------ Forwarded Message ends here ------------
-+-
======================================================================
Hello All!
-= Francois =-
Thunus@Club.TeleMatique.org
http://www.telematique.org/ft
Of course I'm running Windows NO CARRIER
FIDONEWS 14-18 Page 44 5 May 1997
Origin: Gasperich - Luxembourg (zone 2!) ->> (FidoNet 2:270/25.2)
-----------------------------------------------------------------
FIDONEWS 14-18 Page 45 5 May 1997
=================================================================
NOTICES
=================================================================
Future History
17 May 1997
Independence Day, Norway.
3 Jun 1997
2 years since FidoNet had an International Coordinator.
6 Jun 1997
National Commemoration Day, Sweden.
12 Jun 1997
Independence Day, Russia.
1 Jul 1997
Canada Day - Happy Birthday Canada.
9 Jul 1997
Independence Day, Argentina.
13 Oct 1997
Thanksgiving Day, Canada.
1 Dec 1997
World AIDS Day.
10 Dec 1997
Nobel Day, Sweden.
12 Jan 1998
HAL 9000 is one year old today.
22 May 1998
Expo '98 World Exposition in Lisbon (Portugal) opens.
1 Dec 1998
Fifteenth Anniversary of release of Fido version 1 by
Tom Jennings.
31 Dec 1999
Hogmanay, Scotland. The New Year that can't be missed.
1 Jan 2000
The 20th Century, C.E., is still taking place thru 31 Dec.
15 Sep 2000
Sydney (Australia) Summer Olympiad opens.
1 Jan 2001
This is the actual start of the new millennium, C.E.
-- If YOU have something which you would like to see in this
FIDONEWS 14-18 Page 46 5 May 1997
Future History, please send a note to the FidoNews Editor.
-----------------------------------------------------------------
To: vtw-announce@vtw.org, crypto-news@panix.com
From: shabbir@vtw.org (Shabbir J. Safdar)
Reply-To: shabbir@vtw.org (Shabbir J. Safdar)
Subject: ALERT: Groups urge passage of pro-crypto legislation
(4/28/1997)
Date: Mon, 28 Apr 1997 22:26:58 -0400
Sender: owner-crypto-news@lists.panix.com
Reply-To: crypto-news@lists.panix.com
======================================================================
___ _ _____ ____ _____ _
/ _ \| | | ____| _ \_ _| | HOUSE PREPARES TO ENSURE ENCRYPTION
| |_| | | | _| | |_) || | | | AND PRIVACY ON THE INTERNET; SAFE
| _ | |___| |___| _ < | | |_| BILL (HR 695) ABOUT TO BE VOTED ON!
|_| |_|_____|_____|_| \_\|_| (_) April 28, 1997
Do not forward this alert after June 1, 1997.
This alert brought to you by:
Americans for Tax Reform Center for Democracy and
Technology
Eagle Forum EF-Florida
Electronic Frontier Foundation Electronic Privacy Information
Ctr.
Voters Telecommunications Watch Wired Magazine
______________________________________________________________________
Table of Contents
What's Happening Right Now
What You Can Do To Help Privacy And Security On The Internet
Background On SAFE (HR 695)
Why Is This Issue Important To Internet Users?
About This Alert / Participating Organizations
______________________________________________________________________
WHAT'S HAPPENING RIGHT NOW
HOUSE JUDICIARY COMMITTEE TO VOTE ON "SAFE" PRO-INTERNET PRIVACY BILL
The House Judiciary Committee is set to vote on a bill designed to
protect privacy and promote electronic commerce on the Internet as
early as the second week of May. The SAFE bill will also be
considered by a Judiciary subcommittee this week and is expected to
pass without difficulty.
The House Judiciary committee vote on HR695 will mark a critical stage
in the effort to pass real reform of US encryption policy in a way
that protects privacy, promotes electronic commerce, and recognizes
the realities of the global Internet.
FIDONEWS 14-18 Page 47 5 May 1997
Although no bill is perfect, Internet advocates including CDT, EFF,
EPIC, VTW and others, including the Internet Privacy Coalition, have
expressed support for the bill. Supporters agree that the SAFE bill
holds great promise for enhancing privacy and security on the Internet
and have offered their strong support and suggestions to improve it in
a detailed letter at http://www.privacy.org/ipc/safe_letter.html
Please take a moment to read the attached alert, and make a phone call
to urge the committee to pass the bill.
______________________________________________________________________
WHAT YOU CAN DO TO HELP PRIVACY AND SECURITY ON THE INTERNET
1. Check out the information on the SAFE bill below.
2. Call the Representative on the Judiciary committee from your state.
Note that there may be more than one person from your state on the
committee. The list is enclosed below the telephone script.
SAMPLE SCRIPT
You: <dial Capitol switchboard +1.202.224.3121>
May I speak to the office of Rep. (INSERT NAME FROM LIST
BELOW)
Them: Hello, Rep. Mojo's office!
You: May I speak with the staffer who deals with Internet or
telecom issues?
Them: One minute..
SAY THIS-> You: Hello! HR695 will be voted on by the Judiciary
committee in a couple of weeks. I'm calling to urge Rep.
Mojo to pass the bill because it's important to security
and privacy on the Internet.
Them: Thanks, goodbye!
You: Goodbye! <click>
If you have concerns about specific improvements to the bill,
bringing them up when you're on the phone with the staffer is a
good opportunity for raising issues.
Judiciary Committee Members (from committee Web page)
MR. HYDE (ILLINOIS), CHAIRMAN
Mr. Sensenbrenner (Wisconsin) Mr. Conyers (Michigan)
Mr. McCollum (Florida) Mr. Frank (Massachusetts)
Mr. Gekas (Pennsylvania) Mr. Schumer (New York)
Mr. Coble (North Carolina) Mr. Berman (California)
Mr. Smith (Texas) Mr. Boucher (Virginia)
Mr. Schiff (New Mexico) Mr. Nadler (New York)
Mr. Gallegly (California) Mr. Scott (Virginia)
Mr. Canady (Florida) Mr. Watt (North Carolina)
FIDONEWS 14-18 Page 48 5 May 1997
Mr. Inglis (South Carolina) Ms. Lofgren (California)
Mr. Goodlatte (Virginia) Ms. Jackson Lee (Texas)
Mr. Buyer (Indiana) Ms. Waters (California)
Mr. Bono (California) Mr. Meehan (Massachusetts)
Mr. Bryant (Tennessee) Mr. Delahunt (Massachusetts)
Mr. Chabot (Ohio) Mr. Wexler (Florida)
Mr. Barr (Georgia) Mr. Rothman (New Jersey)
Mr. Jenkins (Tennessee) Mr. Hutchinson (Arkansas)
Mr. Pease (Indiana) Mr. Cannon (Utah)
3. *IMPORTANT* Touch base with us at http://www.crypto.com/feedback/
and let us know how the phone call went. Fill out the easy to use
form to let us know what happened during your phone call.
4. Pass this alert on to others until June 1
You've taken the first step to being a part of the powerful
political force of Americans concerned about the health and safety
of the Internet, but have your friends? Forward this alert to them
until June 1, 1997 and urge them to adopt their legislator at
http://www.crypto.com/adopt/
5. Be proud of yourself and relax!
You've done more to protect the Internet in five minutes than many
people will do this year.
______________________________________________________________________
BACKGROUND ON SAFE (HR 695)
In early May, the Judiciary Committee will be voting on whether to
send HR 695, the Security and Freedom Through Encryption (SAFE) Act,
on to the full House of Representatives.
The SAFE Bill, introduced by Reps. Bob Goodlatte (R-VA) and Anna Eshoo
(D-CA), would promote privacy and security on the Internet by:
* relaxing current export controls on encryption technologies;
* prohibiting the government from imposing "key-escrow" or "key-
recovery" inside the United States, and;
* addresses concerns from law enforcement about the use of encryption
in the furtherance of a crime.
The SAFE bill enjoys broad bi-partisan support and currently has 78
co-sponsors.
Although no bill is ever perfect, the SAFE bill, along with Pro-CODE,
a similar bill in the Senate sponsored by Sens. Burns (R-MT) and Leahy
(D-VT), represent the best chance yet of passing real reform of US
encryption policy. The Senate Commerce Committee is expected to hold
a markup on Pro-CODE soon.
The Clinton Administration, through the FBI and NSA, is working hard
behind the scenes to block passage of SAFE and Pro-CODE. The
FIDONEWS 14-18 Page 49 5 May 1997
Administration favors an approach which would limit the availability
of privacy-protecting encryption technologies and compel American
Citizens to ensure law enforcement access to their private online
communications.
By passing the SAFE bill and sending on to the floor, the House
Judiciary Committee will send a strong signal to the Administration
that Congress is serious about passing real reform of US encryption
policy, and would represent an important victory in the fight for
privacy on the Internet.
Detailed background information, including the full text of the bill,
and analysis is available online at http://www.crypto.com/
______________________________________________________________________
WHY IS THIS ISSUE IMPORTANT TO INTERNET USERS?
Encryption technologies are the locks and keys of the Information age
-- enabling individuals and businesses to protect sensitive
information as it is transmitted over the Internet. As more and more
individuals and businesses come online, the need for strong, reliable,
easy-to-use encryption technologies has become a critical issue to the
health and viability of the Net.
Current US encryption policy, which limits the strength of encryption
products US companies can sell abroad, also limits the availability of
strong, easy-to-use encryption technologies in the United States. US
hardware and software manufacturers who wish to sell their products on
the global market must either conform to US encryption export limits
or produce two separate versions of the same product, a costly and
complicated alternative.
The export controls, which the NSA and FBI argue help to keep strong
encryption out of the hands of foreign adversaries, are having the
opposite effect. Strong encryption is available abroad, but because of
the export limits and the confusion created by nearly four years of
debate over US encryption policy, strong, easy-to-use privacy and
security technologies are not widely available off the shelf or "on
the net" here in the US.
A recently discovered flaw in the security of the new digital
telephone network exposed the worst aspects of the Administration's
encryption policy. Because the designers needed to be able to export
their products, the system's security was "dumbed down". Researchers
subsequently discovered that it is quite easy to break the security of
the system and intrude on what should be private conversations.
This incident underscores the larger policy problem: US companies are
at a competitive disadvantage in the global marketplace when competing
against companies that do not have such hindrances. And now, for the
first time in history, the Clinton Administration has proposed
DOMESTIC RESTRICTIONS on the ability of Americans to protect their
privacy and security online.
All of us care about our national security, and no one wants to make
it any easier for criminals and terrorists to commit criminal acts.
FIDONEWS 14-18 Page 50 5 May 1997
But we must also recognize encryption technologies can aid law
enforcement and protect national security by limiting the threat of
industrial espionage and foreign spying, promote electronic commerce
and protecting privacy.
What's at stake in this debate is nothing less than the future of
privacy and the fate of the Internet as a secure and trusted medium
for commerce, education, and political discourse.
______________________________________________________________________
ABOUT THIS ALERT / PARTICIPATING ORGANIZATIONS
For more information, contact the following organizations who have
signed onto this effort at their web sites.
Americans for Tax Reform
http://www.atr.org
Center for Democracy and Technology
http://www.cdt.org
Eagle Forum
http://www.eagleforum.org
EF-Florida
http://www.efflorida.org
Electronic Frontier Foundation
http://www.eff.org
Electronic Privacy Information Center
http://www.epic.org
Voters Telecommunications Watch
http://www.vtw.org
Wired Magazine
http://www.wired.com
______________________________________________________________________
end alert
======================================================================
-30-
-----------------------------------------------------------------
FIDONEWS 14-18 Page 51 5 May 1997
=================================================================
FIDONET SOFTWARE LISTING
=================================================================
Latest Greatest Software Versions
by Peter E. Popovich, 1:363/264
Note: Mid-May, I will phase out the entire "Old Info" section. As
always, I'll be happy to process any information I get, either before
or after it is phased out.
-=- Snip -=-
Submission form for the Latest Greatest Software Versions column
OS Platform :
Software package name :
Version :
Function(s) - BBS, Mailer, Tosser, etc. :
Freeware / Shareware / Commercial? :
Author / Support staff contact name :
Author / Support staff contact node :
Magic name (at the above-listed node) :
Please include a sentence describing what the package does.
Please send updates and suggestions to: Peter Popovich, 1:363/264
-=- Snip -=-
MS-DOS:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
Act-Up 4.6 G D Chris Gunn 1:15/55 ACT-UP
ALLFIX 4.40 T S Harald Harms 2:281/415 ALLFIX
Announcer 1.11 O S Peter Karlsson 2:206/221 ANNOUNCE
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BDOS_260.ZIP
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_DOS
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
CheckPnt 1.0a O G Michiel vd Vlist 2:500/9 CHECKPNT
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FASTECHO
FastEcho/16 1.45a T S Tobias Burchhardt 2:2448/400 FE16
FidoBBS (tm) 12u B S Ray Brown 1:1/117 FILES
FrontDoor 2.12 M S JoHo 2:201/330 FD
FrontDoor 2.20c M C JoHo 2:201/330 FDINFO
GEcho 1.00 T S Bob Seaborn 1:140/12 GECHO
GEcho/Plus 1.11 T C Bob Seaborn 1:140/12 GECHO
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
GoldED 2.50 O S Len Morgan 1:203/730 GED
GoldED/386 2.50 O S Len Morgan 1:203/730 GEX
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
FIDONEWS 14-18 Page 52 5 May 1997
Imail 1.75 T S Michael McCabe 1:1/121 IMAIL
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
InfoMail/86 1.21 O F Damian Walker 2:2502/666 INFOMAIL
InfoMail/386 1.21 O F Damian Walker 2:2502/666 INFO386
InterEcho 1.19 T C Peter Stewart 1:369/35 IEDEMO
InterMail 2.29k M C Peter Stewart 1:369/35 IMDEMO
InterPCB 1.52 O S Peter Stewart 1:369/35 INTERPCB
IPNet 1.11 O S Michele Stewart 1:369/21 IPNET
JD's CBV 1.4 O S John Dailey 1:363/277 CBV
Jelly-Bean 1.01 T S Rowan Crowe 3:635/727 JELLY
Jelly-Bean/386 1.01 T S Rowan Crowe 3:635/727 JELLY386
JMail-Hudson 2.81 T S Jason Steck 1:285/424 JMAIL-H
JMail-Goldbase 2.81 T S Jason Steck 1:285/424 JMAIL-G
MakePl 1.9 N G Michiel vd Vlist 2:500/9 MAKEPL
Marena 1.1 beta O G Michiel vd Vlist 2:500/9 MARENA
Maximus 3.01 B P Tech 1:249/106 MAX
McMail 1.0 M S Michael McCabe 1:1/148 MCMAIL
MDNDP 1.18 N S Bill Doyle 1:388/7 MDNDP
Msged 4.10 O G Andrew Clarke 3:635/728 MSGED41D.ZIP
Msged/386 4.10 O G Andrew Clarke 3:635/728 MSGED41X.ZIP
Opus CBCS 1.73a B P Christopher Baker 1:374/14 OPUS
O/T-Track 2.66 O S Peter Hampf 2:241/1090 OT
PcMerge 2.8 N G Michiel vd Vlist 2:500/9 PCMERGE
PlatinumXpress 1.3 M C Gary Petersen 1:290/111 PX13TD.ZIP
QuickBBS 2.81 B S Ben Schollnick 1:2613/477 QUICKBBS
RAR 2.00 C S Ron Dwight 2:220/22 RAR
RemoteAccess 2.50 B S Mark Lewis 1:3634/12 RA
Silver Xpress
Door 5.4 O S Gary Petersen 1:290/111 FILES
Reader 4.4 O S Gary Petersen 1:290/111 SXR44.ZIP
Spitfire 3.51 B S Mike Weaver 1:3670/3 SPITFIRE
Squish 1.11 T P Tech 1:249/106 SQUISH
StealTag UK 1.c... O F Fred Schenk 2:284/412 STEAL_UK
StealTag NL 1.c... O F Fred Schenk 2:284/412 STEAL_NL
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL
Telegard 3.02 B F Tim Strike 1:259/423 TELEGARD
Terminate 4.00 O S Bo Bendtsen 2:254/261 TERMINATE
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
TosScan 1.01 T C JoHo 2:201/330 TSINFO
TransNet 1.00 G S Marc S. Ressl 4:904/72 TN100ALL.ZIP
TriBBS 11.0 B S Gary Price 1:3607/26 TRIBBS
TriDog 11.0 T F Gary Price 1:3607/26 TRIDOG
TriToss 11.0 T S Gary Price 1:3607/26 TRITOSS
WaterGate 0.92 G S Robert Szarka 1:320/42 WTRGATE
WWIV 4.24a B S Craig Dooley 1:376/126 WWIV
WWIVTOSS 1.36 T S Craig Dooley 1:376/126 WWIVTOSS
xMail 2.00 T S Thorsten Franke 2:2448/53 XMAIL
XRobot 3.01 O S JoHo 2:201/330 XRDOS
OS/2:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
ALLFIX/2 1.10 T S Harald Harms 2:281/415 AFIXOS2
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BOS2_260.ZIP
FIDONEWS 14-18 Page 53 5 May 1997
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_OS2
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FE2
FleetStreet 1.19 O S Michael Hohner 2:2490/2520 FLEET
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
GoldED 2.50 O S Len Morgan 1:203/730 GEO
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
Maximus 3.01 B P Tech 1:249/106 MAXP
Msged/2 4.10 O G Andrew Clarke 3:635/728 MSGED41O.ZIP
PcMerge 2.3 N G Michiel vd Vlist 2:500/9 PCMERGE
RAR 2.00 C S Ron Dwight 2:220/22 RAR2
Squish 1.11 T P Tech 1:249/106 SQUISHP
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL2
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
XRobot 3.01 O S JoHo 2:201/330 XROS2
Windows (16-bit apps):
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
FrontDoor APX 1.12 P S Mats Wallin 2:201/329 FDAPXW
Windows (32-bit apps):
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BW32_260.ZIP
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
GoldED 2.50 O S Len Morgan 1:203/730 GEO
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
Maximus 3.01 B P Tech 1:249/106 MAXN
Msged/NT 4.10 O G Andrew Clarke 3:635/728 MSGED41W.ZIP
PlatinumXpress 2.00 M C Gary Petersen 1:290/111 PXW-INFO
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAILNT
WinFOSSIL/95 1.12 r4 F S Bryan Woodruff 1:343/294 WNFOSSIL.ZIP
WinFOSSIL/NT 1.0 beta F S Bryan Woodruff 1:343/294 NTFOSSIL.ZIP
Unix:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
ifmail 2.10 M G Eugene Crosser 2:293/2219 IFMAIL
ifmail-tx ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX
ifmail-tx.rpm ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX.RPM
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
Amiga:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
CrashMail 1.23 T X Fredrik Bennison 2:205/324 CRASHMAIL
CrashTick 1.1 O F Fredrik Bennison 2:205/324 CRASHTICK
DLG Pro BBOS 1.15 B C Holly Sullivan 1:202/720 DLGDEMO
FIDONEWS 14-18 Page 54 5 May 1997
GMS 1.1.85 M S Mirko Viviani 2:331/213 GMS
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
TrapDoor 1.86.b2 M S Maximilian Hantsch
2:310/6 TRAPDOOR
TrapDoor 1.86.b2 M S Maximilian Hantsch
2:310/6 TRAPBETA
TrapToss 1.50 T S Rene Hexel 2:310/6 TRAPTOSS
Atari:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
BinkleyTerm/ST 3.18pl2 M F Bill Scull 1:363/112 BINKLEY
JetMail 0.99beta22
T S Joerg Spilker 2:2432/1101 JETMAIL
Semper 0.80beta M S Jan Kriesten 2:2490/1624 SMP-BETA
Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
C-Compression, F-Fossil, O-Other. Note: Multifunction will
be listed by the first match.
Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
X-Crippleware, D-Demoware, G-Free w/ Source
Old info from: 01/27/92
---------------------------------------------------------------------
MS-DOS Systems Other Utilities Other Utilities
-------------- Name Version Name Version
-------------------- --------------------
Network Mailers 2DAPoint 1.50* Netsex 2.00b
Name Version 4Dog/4DMatrix 1.18 OFFLINE 1.35
-------------------- ARCAsim 2.31 Oliver 1.0a
D'Bridge 1.30 ARCmail 3.00* OSIRIS CBIS 3.02
Dreamer 1.06 Areafix 1.20 PKInsert 7.10
Dutchie 2.90c ConfMail 4.00 PolyXarc 2.1a
Milqtoast 1.00 Crossnet 1.5 QM 1.00a
PreNM 1.48 DOMAIN 1.42 QSort 4.04
SEAdog 4.60 DEMM 1.06 RAD Plus 2.11
SEAmail 1.01 DGMM 1.06 Raid 1.00
TIMS 1.0(mod8) DOMAIN 1.42 RBBSMail 18.0
EEngine 0.32 ScanToss 1.28
Compression EMM 2.11* ScMail 1.00
Utilities EZPoint 2.1 ScEdit 1.12
Name Version FGroup 1.00 Sirius 1.0x
-------------------- FidoPCB 1.0s@ SLMail 2.15C
ARC 7.12 FNPGate 2.70 StarLink 1.01
ARJ 2.20 GateWorks 3.06e TagMail 2.41
LHA 2.13 GMail 2.05 TCOMMail 2.2
PAK 2.51 GMD 3.10 Telemail 1.5*
PKPak 3.61 GMM 1.21 TGroup 1.13
PKZip 1.10 GROUP 2.23 TIRES 3.11
GUS 1.40 TMail 1.21
NodeList Utilities Harvey's Robot 4.10 TosScan 1.00
FIDONEWS 14-18 Page 55 5 May 1997
Name Version HeadEdit 1.18 UFGATE 1.03
-------------------- HLIST 1.09 VPurge 4.09e
EditNL 4.00 ISIS 5.12@ WEdit 2.0@
FDND 1.10 Lola 1.01d WildMail 2.00
MakeNL 2.31 Mosaic 1.00b WMail 2.2
Parselst 1.33 MailBase 4.11a@ WNode 2.1
Prune 1.40 MSG 4.5* XRS 4.99
SysNL 3.14 MsgLnk 1.0c XST 2.3e
XlatList 2.90 MsgMstr 2.03a YUPPIE! 2.00
XlaxNode/Diff 2.53 MsgNum 4.16d ZmailH 1.25
MSGTOSS 1.3 ZSX 2.40
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Key to old info:
+ - Netmail Capable (Doesn't Require Additional Mailer Software)
* - Recently Updated Version
@ - New Addition
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Please send updates and suggestions to: Peter Popovich, 1:363/264
-----------------------------------------------------------------
FIDONEWS 14-18 Page 56 5 May 1997
=================================================================
FIDONEWS PUBLIC-KEY
=================================================================
[this must be copied out to a file starting at column 1 or
it won't process under PGP as a valid public-key]
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
Comment: Clear-signing is Electronic Digital Authenticity!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=61OQ
-----END PGP PUBLIC KEY BLOCK-----
File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
the FidoNews homepage listed in the Masthead information.
-----------------------------------------------------------------
FIDONEWS 14-18 Page 57 5 May 1997
=================================================================
FIDONET BY INTERNET
=================================================================
This is a list of all FidoNet-related sites reported to the Editor as
of this appearance.
============
FidoNet:
Homepage http://www.fidonet.org
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
HTML FNews http://www.geocities.com/Athens/6894/
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
FTSC page http://www2.blaze.net.au/ftsc.html
Echomail http://www.portal.ca/~awalker/index.html
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
============
Zone 1: http://www.z1.fidonet.org
Region 10: http://www.psnw.com/~net205/region10.html
Region 11: http://oeonline.com/~garyg/region11/
Region 13: http://www.smalltalkband.com/st01000.htm
Region 14: http://www.netins.net/showcase/fidonet/
Region 15: http://www.smrtsys.com/region15/ [disappeared?]
Region 16: http://www.tiac.net/users/satins/region16.htm
Region 17: http://www.portal.ca/~awalker/region17.htm
Region 18: http://www.citicom.com/fido.html
Region 19: http://home1.gte.net/bhamilt/index.htm
============
Zone 2: http://www.z2.fidonet.org
ZEC2: http://fidoftp.paralex.co.uk/zec.htm [shut down?]
Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm
Region 20: http://www.fidonet.pp.se (in Swedish)
Region 24: http://www.swb.de/personal/flop/gatebau.html (in German)
Region 25:
http://members.aol.com/Net254/
Region 27: http://telematique.org/ft/r27.htm
FIDONEWS 14-18 Page 58 5 May 1997
Region 29: http://www.rtfm.be/fidonet/ (in French)
Region 30: http://www.fidonet.ch (in Swiss)
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
REC34: http://pobox.com/~chr
Region 36: http://www.geocities.com/SiliconValley/7207/
Region 41: http://www.fidonet.gr (in Greek and English)
Region 48: http://www.fidonet.org.pl
============
Zone 3: http://www.z3.fidonet.org
============
Zone 4: (not yet listed)
Region 90:
Net 904: http://members.tripod.com/~net904 (in Spanish)
============
Zone 5: (not yet listed)
============
Zone 6: http://www.z6.fidonet.org
============
-----------------------------------------------------------------
FIDONEWS 14-18 Page 59 5 May 1997
=================================================================
FIDONEWS INFORMATION
=================================================================
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
Editor: Christopher Baker
Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
Vince Perriello, Tim Pozar, Sylvia Maxwell,
Donald Tees
"FidoNews Editor"
FidoNet 1:1/23
BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds)
more addresses:
Christopher Baker -- 1:18/14, cbaker84@digital.net
cbaker84@aol.com
cbaker84@msn.com
(Postal Service mailing address)
FidoNews Editor
P.O. Box 471
Edgewater, FL 32132-0471
U.S.A.
voice: 1-904-409-3040 [1400-2100 ET only, please]
[1800-0100 UTC/GMT]
------------------------------------------------------
FidoNews is published weekly by and for the members of the FIDONET
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
of individual articles contributed by their authors or their
authorized agents. The contribution of articles to this compilation
does not diminish the rights of the authors. OPINIONS EXPRESSED in
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
FidoNews.
Authors retain copyright on individual works; otherwise FidoNews is
Copyright 1997 Christopher Baker. All rights reserved. Duplication
and/or distribution permitted for noncommercial purposes only. For
use in other circumstances, please contact the original authors, or
the Editor.
=*=*=*=*=*=*=*=*=
OBTAINING COPIES: The most recent issue of FidoNews in electronic
form may be obtained from the FidoNews Editor via manual download or
file-request, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained by sending SASE to the above postal
address. File-request FIDONEWS for the current Issue. File-request
FNEWS for the current month in one archive. Or file-request specific
back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
FIDONEWS 14-18 Page 60 5 May 1997
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
where mmm = three letter month [JAN - DEC] and y = last digit of the
current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
size from 48K to 1.4M.
INTERNET USERS: FidoNews is available via:
http://www.fidonet.org/fidonews.htm
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
ftp://ftp.aminet.org/pub/aminet/comm/fido/
*=*=*
You may obtain an email subscription to FidoNews by sending email to:
jbarchuk@worldnet.att.net
with a Subject line of: subscribe fnews-edist
and no message in the message body. To remove your name from the email
distribution use a Subject line of: unsubscribe fnews-edist with no
message to the same address above.
*=*=*
You can read the current FidoNews Issue in HTML format at:
http://www.geocities.com/Athens/6894/
STAR SOURCE for ALL Past Issues via FTP and file-request -
Available for FReq from 1:396/1 or by anonymous FTP from:
ftp://ftp.sstar.com/fidonet/fnews/
Each yearly archive also contains a listing of the Table-of-Contents
for that year's issues. The total set is currently about 11 Megs.
=*=*=*=
The current week's FidoNews and the FidoNews public-key are now also
available almost immediately after publication on the Editor's new
homepage on the World Wide Web at:
http://ddi.digital.net/~cbaker84/fidonews.html
There are also links there to jim barchuk's HTML FidoNews source and
to John Souvestre's FTP site for the archives. There is also an email
link for sending in an article as message text. Drop on over.
=*=*=*=*=*=*=*=*=
A PGP generated public-key is available for the FidoNews Editor from
FIDONEWS 14-18 Page 61 5 May 1997
1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It
is also posted twice a month into the PKEY_DROP Echo available on the
Zone 1 Echomail Backbone.
*=*=*=*=*
SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators
also have copies of ARTSPEC.DOC. Please read it.
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
and are used with permission.
"Disagreement is actually necessary,
or we'd all have to get in fights
or something to amuse ourselves
and create the requisite chaos."
-Tom Jennings
-30-
-----------------------------------------------------------------