textfiles/bbs/FIDONET/FIDONEWS/fido1423.nws

2195 lines
99 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

F I D O N E W S -- Volume 14, Number 23 9 June 1997
+----------------------------+-----------------------------------------+
| The newsletter of the | ISSN 1198-4589 Published by: |
| FidoNet community | "FidoNews" |
| _ | 1-904-409-7040 [1:1/23] |
| / \ | |
| /|oo \ | |
| (_| /_) | |
| _`@/_ \ _ | |
| | | \ \\ | Editor: |
| | (*) | \ )) | Christopher Baker 1:18/14 |
| |__U__| / \// | |
| _//|| _\ / | |
| (_/(_|(____/ | |
| (jm) | Newspapers should have no friends. |
| | -- JOSEPH PULITZER |
+----------------------------+-----------------------------------------+
| Submission address: FidoNews Editor 1:1/23 |
+----------------------------------------------------------------------+
| MORE addresses: |
| |
| submissions=> cbaker84@digital.net |
+----------------------------------------------------------------------+
| For information, copyrights, article submissions, |
| obtaining copies of FidoNews or the internet gateway FAQ |
| please refer to the end of this file. |
+----------------------------------------------------------------------+
IT'S ONLY LAME WITH AN F
Table of Contents
1. EDITORIAL ................................................ 1
What would it take to get YOU to submit something? ....... 1
2. LETTERS TO THE EDITOR .................................... 2
To Compress Mail or Not to Compress Mail? ................ 2
3. ARTICLES ................................................. 4
FidoNet Via Internet Hubs ................................ 4
Some thoughts on a possible future direction for Fidone .. 4
SILLYSEASON Echo forming ................................. 6
Why I bother ............................................. 7
4. COLUMNS .................................................. 9
Lock and Load: Guerilla Marketing for BBSes .............. 9
5. GETTING TECHNICAL ........................................ 11
FSC-0080 - Describing FidoNet with layered model ......... 11
FSC-0081 - A TYPE-3 Packet proposal ...................... 13
6. COORDINATORS CORNER ...................................... 28
Nodelist-statistics as seen from Zone-2 for day 157 ...... 28
7. NET HUMOR ................................................ 29
Nevermore? ............................................... 29
8. NOTICES .................................................. 31
Future History ........................................... 31
9. FIDONET SOFTWARE LISTING ................................. 32
Latest Greatest Software Versions ........................ 32
10. FIDONEWS PUBLIC-KEY ..................................... 36
FidoNews PGP public-key listing .......................... 36
And more!
FIDONEWS 14-23 Page 1 9 Jun 1997
=================================================================
EDITORIAL
=================================================================
What? No urge to write something for FidoNews? You don't have to do a
formal article or column. You can just send in something via Netmail.
You can pick something new or forward something of yours from an Echo
or some other forum.
It's your newsletter.
C.B.
-----------------------------------------------------------------
FIDONEWS 14-23 Page 2 9 Jun 1997
=================================================================
LETTERS TO THE EDITOR
=================================================================
[This wasn't a Letter to the Editor, but it should have been. Folks
should not be sending compressed mail to strangers. It adds an extra
step when receiving mail from unsecured sources among other
concerns. Unless you're sending a ton of mail, why bother?] Ed.
--- Following message extracted from FTSC_PUBLIC @ 1:18/14 ---
By Christopher Baker on Thu Jun 05 15:17:35 1997
From: Lisa Gronke
To: All
Date: 03 Jun 97 06:45:02
Subj: ARC
* Original Area: PDX.SYSOP
* Original To : Phil McCloud (1:105/61)
The gospel says you should use either use ARC or no compression when
sending to strangers.
The reality is that you're more likely to run into someone who can't
unARC than someone who can't unZIP.
There is a networking precept that says, "Be liberal in what you
accept; be conservative in what you send."
As long as a sysop understands the landscape, there shouldn't be much
of a problem either way.
The biggest problem is passing around configuration files with ZIP
configured as the default. That breeds new sysops who can't unARC and
don't even know that they should be able to.
I recommend ARC as the default, but encourage everyone to explicitly
address the archiver issue at the time an echomail link is
established. Alternatively, if you have ZIP as your default, the first
interchange with a stranger should ask if it is OK.
And for gawds sake, don't get into a policy pissing contest over the
issue.
> I believe some form of .ZIP can be compiled for any platform,
> however none has ever changed the 'standard'.
ZIP is very difficult to implement on 8-bit, 64K RAM systems. The
lookup tables are too big to be kept in RAM. But 8-bit FidoNet systems
are becoming as rare as ivory billed woodpeckers.
No one has ever changed the 'standard' (which, btw, is durned
difficult to find in the FTSC documents), but almost everyone has
managed to minimize the effect. Other than the nodediff, ftsc and
policy documents, nothing of any size is sent ARCed. The amount of
FIDONEWS 14-23 Page 3 9 Jun 1997
bandwidth actually lost in ARC transfers is probably less than the
bandwidth that will be used in arguing about what the replacement
should be <g>.
A more cogent argument for the future is that zip/unzip are widely
available in the unix world, whereas arc is not. I have three unix
shell accounts. All have zip/unzip. None of them has arc. One has
lharc. Oh, I'm sure that I can find unix arc source somewhere and
compile it, but that's a lot of trouble if all I want to do is read
policy4.arc from ftp.paonline.com.
Incidentally, the "ARC" issue is a FidoNet (the network) issue, not a
FidoNet (technology) issue. FTN OtherNets could have a different
archiver policy.
Origin: EastSide Data Services (1:105/61)
-----------------------------------------------------------------
FIDONEWS 14-23 Page 4 9 Jun 1997
=================================================================
ARTICLES
=================================================================
Fidonet Via Internet Hubs
Speed|Node# |Operator | Facilities | Basic Rate
-----+-----------+------------------+-------------------+-----------
T1 |1:270/101 |George Peace | FTP | $30mo.
T1 |1:396/1 |John Souvestre | FTP | $25mo.
T1 |1:12/12 |Ken Wilson | FTP | $24mo.
T1 |1:140/12 |Bob Seaborn | FTP, Transx | $5/$20
64k |1:124/7008 |Ben Hamilton | FTP, VFOS, Transx | $20mo.
56k |1:13/25 |Jim Balcom | FTP | $20mo.
33.6 |1:2604/104 |Jim Mclaughlin | FTP, VFOS, UUEMAIL| $1mo.
33.6 |1:2624/306 |D. Calafrancesco | VFOS | $15yr.
33.6 |1:281/169 |Brian Greenstreet | FTP | $2mo.
28.8 |1:330/204 |Patrick Rosenheim | Transx | $25yr.
--
compiled by Cindy Ingersoll, 1:2623/71, (609)814-1978,
fbn@cyberEnet.net Posted on the 1st of every month in FN_SYSOP,
R13SYSOP and Fidonews.
---
-----------------------------------------------------------------
Some thoughts on a possible future direction for FidoNet:
by Ron Dwight
2:220/22
I have been giving consideration lately to a future direction in
which Fidonet could go and the following is offered for your
consideration:
.. Fidonet is a vastly different medium than the internet and should
not be swallowed by it. Fidonet should retain it's current character,
freedom and flexibility.
.. FidoNet nodes need the speed and reduced cost of internet access,
to communicate, this is why such things as Vmodem are being written.
.. The FidoNet nodelist appears to be the largest single obstacle
standing in the way of major changes to Fidonet methodology and either
the nodelist can be changed to accommodate the new methods or
alternative methods can be devised which make use of the current
nodelist.
What I am going to propose here, is a method of using the
current nodelist, with almost no changes and yet allow those nodes
which require access to internet transport, to obtain it quickly and
easily.
FIDONEWS 14-23 Page 5 9 Jun 1997
The basic concept revolves around the actual method of
operation of the internet itself to satisfy the needs of Fidonet
nodes. Whenever a connection is made, using a web browser, the
address which you are seeking, http://.... is sent to a Network Access
Point computer which translates that name into a TCP/IP address. This
is sent back to your browser which then uses it to reach the
destination computer on the internet.
What I propose for Fidonet, is something very similar which
will allow us to maintain the current nodelist format and content and
yet obtain full access to internet capable systems willing to
accept callers running Vmodem, Binkd or something similar..
1) A computer, or computers, serve as Fidonet Internet Access Points.
This would best be provided by a reliable system owned and
operated by a large corporation. To that end we would perhaps
need to obtain a sponsor, IBM would do nicely, so would US
Robotics, to provide access to an internet server to act as the
Fidonet Name Information Center. The load on this machine would
not be great, but a little software would need to be written for
it.
2) We then write a series of specifications for software which would
use this service to access other Fidonet nodes via the internet.
Part of this software specification would be something like:
.. All internet capable nodes would be flagged in the nodelist
with a single flag to indicate internet capability. The flag could
be, for example: INET or something similar and the flag would indicate
ONLY that the system was connected to the internet and was capable of
accepting FidoNet callers. No other information would be carried in
the nodelist and the nodelist entry could be used to indicate a normal
PSTN node as well as an internet capable one.
.. Mailers wishing to access an internet capable node must send a
message, containing ONLY the FidoNet node number
(Zone:Net/Node.point), over the internet to the FidoNet Name
Information Center. The reply from that server would be a message
containing the capabilities of that node which could then be used to
establish (or refuse) a session. The time overhead for such a service
would be a matter of milliseconds under normal conditions and would
not add significantly to the length of a session.
.. Mailer software, in order to reduce the number of transactions
to the Name Information Center, would check if the information is
locally available for the called number and use that if it was, say,
less than 7 days old. In other words if the system had been called
within the last 7 days, it is expected that the same session
parameters can be used without requesting them again from the Name
Information Center.
3) The information contained, and updated, on the Name Information
Center would be such things as:
.. Transport capability
.. Open hours
FIDONEWS 14-23 Page 6 9 Jun 1997
.. Protocol availability
In other words, all the stuff that folks are trying to cram
into the nodelist now. It could be in IEMSI format or similar.
A Fidonet node, ZC?/IC? or designated SysOp, would be
responsible for ensuring that the Name Information Center was properly
updated and functional.
This is only the basic outline of a concept which could be
used to enhance Fidonet capability. I believe the sponsorship would
be easy to obtain as the load on the Name Information Center machine
would be very light as long as the mailers obeyed reasonable rules as
to access. More important would be laying down the rules and
mechanisms for the software to take advantage of the capabilities
offered. Obviously a lot of technical detail needs to be worked out,
but I believe this could be used as a basis to move FidoNet into a
closer cooperation with the internet to our mutual advantage.
Someone is going to object that using a single Name
Information Center gives the entire system a central weakness. In
answer to that I would reply that:
.. Most of the entire WORLDWIDE internet services rely on only a few
such centers.
.. There is no reason why more than one machine could not be used and
that these could be indicated in the nodelist, perhaps as comment
lines, which mailer software can locate. Of course the more Name
Information Centers which are created, the more difficult it becomes
to keep them updated.
This mini-article is intended as a START. Andy, Jo, Arjen
and other developers, it's up to people like you to carry it further
and make it become a reality.
-----------------------------------------------------------------
SILLYSEASON Echo forming
Fredric L. Rice (frice@linkline.com)
The Skeptic Tank - 1:102/890.0
(818) 335-9601 24hrs N81
A new FidoNet echo -- tag named "SILLYSEASON" -- is forming and I'm
soliciting participation. The forum will discuss the "Millennium"
television series yet will also cover the broad spectrum of phenomena
from which the series draws upon for its subject matter.
The so-called "Millennium lunacy" phenomena has been commented upon
and researched in growing frequency this last decade -- and for
obvious reasons: The year 2,000 is only three years away. The
phenomena labels the cyclic rise and fall of destructive behavior and
beliefs plotted against the year number; yet it has nothing to do with
numerology. It's a matter of the human psychology behind how humans
contrive notions of significance when there are none. The phenomena
FIDONEWS 14-23 Page 7 9 Jun 1997
is also called the "silly season" and has been the subject of several
books and magazine articles.
Even though the contemporary calendar is a hodge podge of badly formed
months, weeks, and days, societies ever since the contemporary
calendar was widely adopted have placed great significance to the year
number whenever a new decade, century, or millennium comes along.
Though the year numbers aren't predicated upon any meaningful event or
indicate any meaningful demarcation, when a year number ends with a
zero, a large portion of the so-called "Westernized societies" feel
inclined to believe any damn silly thing and to "prophecy" much
disaster. Sadly, many such believers work hard to bring about their
images of doom and destruction in self-fulfilling prophecy. We
observe the results of such beliefs in our newspapers and on
television news reports.
For a link to the forum, contact me and I'll set it up. I suspect
that this will be a fairly low-volume forum except for times
immediately following some Millennium lunacy --such as repeats of the
"Heaven's Gate" mass suicides which are expected and the violent
activities of self-proclaimed "militias."
-----------------------------------------------------------------
Why I bother
by Troy H. Cheek (1:362/708.4)
Some say Fidonet is dead. Obviously, since I'm writing this, and
you're reading it, and it went through Fidonet, then Fidonet isn't
dead. As long as Fidonet isn't dead, it will require people to run
BBS's, maintain nodelists, move messages, and moderate echoes. People
who catch a lot of flak and get very little praise, but people who are
required nonetheless.
I've moderated a few Fidonet echomail conferences over the years for
various reasons. The ones I moderate right now, however, have exactly
one thing in common: They were abandoned without notice by their
previous moderators.
I took over echoes which were "dead" or "dying". You want to hear
something funny? All of them are still active and still on the
backbone. Had I not taken over, it's possible some of these echoes
would no longer exist. But they would not have died because of lack
of interest of the end users; they would have died because nobody with
the proper knowledge bothered to update an echolist entry.
In my mind, there's no doubt that the eventual demise of Fidonet will
_not_ be because there are no longer any end users (lured away by the
promise of the Internet and other factors), but because the people who
do the vital jobs of Fidonet will give them up under the mistaken
impression that they are no longer needed.
Back in the early Fidonet days, the stand-alone BBS was declared dead.
After all, what single BBS could possibly compete with a nation-wide
network? And, hearing this solemn announcement that they were dead,
FIDONEWS 14-23 Page 8 9 Jun 1997
BBS's closed shop or joined Fidonet. A funny thing happened on the
way to the funeral, though. Some of the BBS's didn't listen and
continued to operate for as long as they still had callers. Some
operated for years. A few are _still_ operating to this day. And I've
been known to call a few every now and then.
Fidonet has been declared dead, killed by the Internet. In spite of
being dead, there are still a lot of people using it daily. So,
should we close up shop, forcing all these users to find other means
of communication? Or maybe, just maybe, should we keep the doors open
until the message packets actually stop coming in?
By all means hook into the Internet! Learn about the World Wide Web
and news services and electronic mail! Make new friends! Discover
new sources of knowledge! But since you can do all these things
without giving up Fidonet, why do so many people demand we do exactly
that? Are they afraid that if we don't take their word that Fidonet
is dead, instead of waiting for the mail packets to actually quit
coming in, that it just might take years or even decades before
Fidonet really ceases to exist?
As long as I still have access to Fidonet, and as long as there are
still echoes that interest me, I'll keep posting messages. And as
long some of these echoes need somebody to send in echolist entry
updates and perform the various administrivia functions, I'll still be
a moderator.
Troy H. Cheek, VID_GAME Echo Moderator (among others)
--
|Fidonet: Troy H. Cheek 1:362/708.4
|Internet: 362-708-4!Troy.H..Cheek@river.chattanooga.net
|
| Standard disclaimer: The views of this user are strictly his own.
| River Canyon Rd. BBS <=> Chattanooga OnLine! Gateway to the World.
-----------------------------------------------------------------
FIDONEWS 14-23 Page 9 9 Jun 1997
=================================================================
COLUMNS
=================================================================
Lock and Load: Guerilla Marketing for BBSes
(A Parenthetical Column) (Robert Parson) (1:3822/1)
Every month, a major owner shuts down operations. More operations are
rumored to be on the brink of going under. Everyone moans about the
state of the industry. "The end is near!"
Sounds familiar, doesn't it? Sure sounds like BBSes. But it isn't.
This is newspaper.
True, the total number of newspapers is down, as is total circulation.
But revenues are at an all time high. That's because they maximize
their audience. That's consultantspeak for targeting the readership.
Do you really think they created "Food" sections solely because it
would be a nice thing for the reader? No. They were created as a
showcase for grocery ads.
(Printed newspapers will never die, as some people have predicted, but
that's another column for another time)
BBSes can learn an important lesson here. This doesn't mean everyone
should go out and create big "Food" areas on their BBSes (although
we'll get to that shortly). However, you can focus some of your
marketing on specific areas of your BBS.
Many of you have already experienced success with Genealogy areas or
possibly even dedicating your BBS to Genealogical research. Some of
you look at gaming or chatting to draw in callers. But there are
plenty of other topics that are ripe for the pickin'.
Let's get back that "Food" section (this is going to be in a rather
circular fashion, so hang with me.)
Most BBSes have their messages bases numbered in some way or another.
In many cases they are also alphabetized. But for the most part, they
are not organized in any particular way.
Pull together a text file or a bulletin of some sort that puts the
message bases into topic order. Your callers can download this file
or bulletin, do a search for "FOOD" and there will be a list of the
message areas that are food-related. You could also include a few
lines that will point them to files available on your BBS that are
food-related (such as "Search the file section for 'meal' and/or
'recipe'!")
While this doesn't create quite the same atmosphere as a "Food"
section in the newspaper, it gives your callers a fairly easy to
use index of what to look for when they are setting up their mail
readers. (Sure, they can do a word search using the echo list you have
available now, but this way they'll just have to do one search instead
of a bunch.)
FIDONEWS 14-23 Page 10 9 Jun 1997
This will also give you a more specific idea of where everything is at
when you do any sort of outside promotions. For instance, you can
declare "Food Month" on your BBS. You can highlight the food message
bases and files in bulletins, local message areas, printed materials,
in a speech to the local culinary society, on a table at the county
fair, maybe even enter the local chili cookoff (using a recipe found
on your BBS, of course).
You can easily create and promote other "virtual sections" as well.
But as I keep saying, you have to do more than leave a message on
other BBSes saying "Come look at my Food Section. Think "out of the
box." That's Bobspeak for get "out of the house." At the very least,
you'll get a tan.
But wait! There's more!
Steve Prado, the Sysop of my Friendly Neighborhood BBS, Jackalope
Junction (1:3822/1) this past week was a guest on KWHN-AM Fort Smith,
AR talking about BBSes and International BBS Week.
The tone of the interview was positive. Steve was able to pass along
some good information, not just about his BBS but others in town and
even a bit about Fidonet. (By the way, he adapted the sample news
release I wrote a few weeks back and sent it to the radio station.
For full disclosure: I happen to work there and did help set up the
interview. But he did the hard work)
Good job, Steve!
Robert Parson
-----------------------------------------------------------------
FIDONEWS 14-23 Page 11 9 Jun 1997
=================================================================
GETTING TECHNICAL
=================================================================
[This is part of the continuing FidoNet History series publishing the
FTSC Standards and Proposal documents. FSC-0079 {RTF} is skipped due
to its length {60K}. These docs have been reformatted to 70 columns
where required and any tables may be askew as a result. High ASCII
characters have been removed or replaced. Node numbers and telephone
numbers may be out of date.] Ed.
| Document: FSC-0080
| Version: 001
| Date: 01 Mar 1995
|
| Mikael Stoldal, 2:201/337
Describing FidoNet with a layered model
Mikael Stoldal, 2:201/337@FidoNet
Introduction
============
FTS-1 tries to describe FidoNet with the OSI model, but I don't think
that description is any good.
I have tried to make a better description of FidoNet with the OSI
model, but without success. I don't think that's possible.
Instead I made my own layered model, inspired from OSI. I use seven
layers with the same name as in OSI, but with Session and Transport
swapped.
Why this model?
===============
The main goal with this model is to make FidoNet more flexible make it
easier to change into newer and better protocols and data structures.
It should be possible to change one layer without affecting the
others.
Description of the layers
=========================
Physical layer
--------------
The telephone network (PSTN).
Link layer
----------
Modem with protocols like V.22 and V.32. This layer also include real-
time error correction (V.42, MNP4) and data compression (V.42bis,
MNP5).
Serial communication hardware (UART).
FIDONEWS 14-23 Page 12 9 Jun 1997
Network layer
-------------
Serial communications drivers (FOSSIL) and file transfer protocols
(Zmodem etc). Note that this layer can be divided into two sub-layers,
the file transfer protocol on top on the serial communication driver;
but upper layers can interact with the serial communication driver
directly.
Session layer
-------------
Session handshake protocols (YooHoo, EMSI) implemented in mailers.
This layer can reliably send files directly between two systems. It
doesn't perform any routing. It doesn't know about NetMail, EchoMail
etc.
The upper layers uses logical addresses (node numbers), this layer
performs address resolution (often by using a nodelist) to obtain the
physical address (telephone number) necessary to establish a
connection.
The upper layers can tell if a file should be sent immediately, when
appropriate or be placed on hold.
When files are received, this layer tells the upper layers.
Transport layer
---------------
This layer handles routing and transport of NetMail, EchoMail and file
attaches. The format of mailpackets is defined in this layer, except
the internal structure of a packed message.
A mail processor takes received NetMail and EchoMail and places it in
the local message base. It also looks there for messages to send.
Presentation layer
------------------
Here are the internal structure of a packed message defined.
In TYPE-2, this layer is totally mixed up with the Transport layer. In
new packet formats, they will hopefully be separated.
Application layer
-----------------
Here are the local message base (stored messages) defined.
Interaction between layers
==========================
Interaction between Session layer and Transport layer
-----------------------------------------------------
The Session and Transport layers does only interact between sessions,
not during them. The reason is that is should be possible to keep them
in different programs and implement it in single tasking operating
systems like MS-DOS. This doesn't prevent the Session and Transport
layers from running simultaneously in a multitasking system.
FIDONEWS 14-23 Page 13 9 Jun 1997
Comments
========
There is one problem with this model, how to describe the File Request
server function. Sending File Requests are no problems, that's just a
File Attach with a *.REQ file. The File Request server function have
to be implemented directly in the Session layer.
-----------------------------------------------------------------
| Document: FSC-0081 Part A
| Version: 001
| Date: 01 Mar 1995
|
| Mikael Stoldal, 2:201/337
A TYPE-3 Packet proposal
Mikael Stoldal, 2:201/337@FidoNet
Status of this document
=======================
Copyright (C) 1992-1994 by Mikael Stoldal.
This document may be freely distributed and copied. The standard
described may be implemented by anybody. You may not distribute
modified versions of this document without written permission from the
author.
Fido and FidoNet are registered trademarks of Tom Jennings and Fido
Software.
Introduction
============
This is a proposal on a new packet format for use in FidoNet and other
FTNs (FTN = FidoNet Technology Network). This format can be used for
both NetMail (private point-to-point mail) and EchoMail (electronic
conferences).
This document defines the transport layer. It also includes a
presentation layer definition, but that can be changed without
affecting the transport layer. It also includes a application layer
(stored messages) definition,
but it's not mandatory.
This packet format conforms with FSC-39, rev 4. It has the PktType
field in the header at the same position as TYPE-2 and it contains a
capability word at the same position as TYPE-2+ (but no CW validation
copy). The packet header has also the same size as in TYPE-2. This
should make it easy to implement mail-processors supporting both TYPE-
2 and TYPE-3.
This packet format separates the header from the message data and the
header is extensible. A mail processor (the transport layer) doesn't
have to look at the message data.
This format eliminates most kludges currently used in TYPE-2.
FIDONEWS 14-23 Page 14 9 Jun 1997
This packet format allows multiple AreaTags in EchoMail.
This packet format is much more extensible than TYPE-2 and is probably
easier to implement.
This packet format allows up to 4 GigaBytes large messages and allows
binary data in messages, this makes it possible to implement
multimedia capabilities in the future.
Definitions
===========
Characters
----------
In this document, literal characters are written as two uppercase
hexadecimal (base 16, 0..9A..F) digits following by lowercase h, e.g.
"1Fh". The following abbreviations are used: "NUL" means 00h, "CR"
means 0Dh and "space" means 20h (the quotation marks are not
included).
Basic data types
----------------
Name Length Description
----------------------------------------------------------------------
ShortInt 1 8-bit unsigned integer.
Integer 2 16-bit unsigned integer, Intel 8086 byte order.
LongInt 4 32-bit unsigned integer, Intel 8086 byte order.
Byte 1 Field of 8 bits.
Word 2 Field of 16 bits, Intel 8086 byte order.
String[n] n Fixed length string of n bytes, NUL-padded.
String{n} max n Variable length string of max n bytes, NUL-
terminated.
n includes the terminating NUL.
String Variable length string, not terminated.
Address
-------
Field Type Description
Range
----------------------------------------------------------------------
Zone Integer Zone address.
1..65535
Net Integer Net address.
1..65535
Node Integer Node address.
0..65535
Point Integer Point address or zero if boss.
0..65535
FTN address in text format
--------------------------
An FTN address in text format must, unless otherwise stated, be in the
Zone:Net/Node[.Point] format, where .Point must be excluded if point
is zero, included otherwise.
TimeStamp
FIDONEWS 14-23 Page 15 9 Jun 1997
---------
A LongInt which contains the number of seconds since 00:00:00 1st
January 1970 UTC.
Organization
------------
An organization is a network such as FidoNet, VirNet, SigNet or
InterNet. It's sometimes called "domain", but I use the term
organization to avoid confusion with InterNet domains.
Reserved
--------
All fields marked "reserved for future extension" must be zeroed when
creating/writing and ignored when reading. They might be defined by
future revisions of this document.
Filenames
=========
It's recommended to use the naming scheme in FTS-LIST, for both
NetMail and EchoMail. There should be no problem with using the same
name space for TYPE-2 and TYPE-3 packets because the packet headers
are enough compatible.
Packet format
=============
Packet header
Zero or any number of data records.
00h 00h
The first two bytes of a data record is used to check for the end of a
packet. If both are zero, the end is reached (and the rest, if any,
should be ignored).
Packet header
=============
Field Type Description
----------------------------------------------------------------------
PktOrig Address The node who created this packet.
PktDest Address The node who should receive this packet.
SubType Integer Packet contents (see below).
PktType Integer Always 3.
PktDate TimeStamp When the packet was created.
ProdCode Integer FTSC Product Code.
Programs without Product Code must use
65535.
MajorVer ShortInt Major product version.
MinorVer ShortInt Minor product version.
Org String[16] Organization (see below).
CapWord Word Capability Word (see FSC-39).
Password String[8] Packet password.
ExtraInfo String[4] Reserved for future extension.
SubType
-------
Defines what the packet contains.
FIDONEWS 14-23 Page 16 9 Jun 1997
If this field is zero, data record is defined by the "Packed message"
part of this document. If this field is non-zero, data record is not
defined by this document.
This field can be used for two things. The first is to define new
packet types without having to use a new packet header. The second is
to allow distribution of other things than Email.
Organization
------------
This field contains the name of the organization the packet travels
in. This field applies to both PktOrig and PktDest since packets are
intra-organization.
Packed message
==============
The messages should be in chronological order in a packet.
Field Type Description
----------------------------------------------------------------------
HeadSize Integer Size of the message header (see below).
MsgFlags Word Message flags (see below).
MsgDate TimeStamp When the message was created.
MsgID LongInt Unique message identifier (see below).
ReplyID LongInt Reply linkage information (see below).
MsgLength LongInt Size of MsgData.
MsgOrig Address The node who created this message.
MsgDest Address The node who should receive this message.
CharSet ShortInt Character set (see below).
MsgType ShortInt Type of MsgData (see below).
Area String{255} AreaTag(s) (see below).
OrigAddr String{255} Origin address in text format (see
below).
ReplyAddr String{255} Reply linkage information (see below).
FromUser String{255} Who wrote this message?
ToUser String{255} To whom?
Subject String{255} Subject or one filename
(for file attaches and requests).
Path String{65535} Path (see below).
HeadExt String Header extension fields (see below).
MsgData String Message data (see below).
HeadSize
--------
The total size of the message header (all fields except MsgData).
Since this is an Integer, the header can't be bigger than 65535 bytes
and Path can never reach it's maximum length (how big it can be
depends on how big the rest of the header is).
Message flags
-------------
Bit Flag Meaning
----------------------------------------------------------------------
0 Pvt Private message.
1 File File attach message.
2 FileReq File request message.
FIDONEWS 14-23 Page 17 9 Jun 1997
3 UpdReq File update request message.
4 Direct Do not route this message.
5 Crash High priority mail.
6 Hold Hold for pickup.
7 IMM Immediate mail (highest priority).
8 RRQ Return receipt request (see below).
9 CRQ Confirm receipt request (see below).
10 IRR Is return receipt (see below).
11 Machine Message to a program (see below).
12 NoForCC CC in NetMail, NoForward in EchoMail (see below).
13 Permanent Message must not be purged by age (see below).
14 Foreign Message is from another organization.
15 reserved Reserved for future extension.
RRQ, CRQ and IRR
----------------
The RRQ and CRQ flags without IRR is used to ask the software at the
final destination to generate a receipt message to the sender. The
receipt to an RRQ flagged message must be generated when the message
is received, and this receipt must have the IRR and RRQ flags set. The
receipt to a CRQ flagged message must be generated when it has been
read by its addressee, and this receipt must have the IRR and CRQ
flags set.
A receipt must have the ReplyAddr and ReplyID fields set as if it was
a reply to the original message.
It's up to each network's policy to decide if all systems must support
this, no system are allowed to support this or all systems are allowed
but not forced to support this.
Machine
-------
The Machine flag indicates that this message is addressed to a program
and not a human. A mail processor should store such messages as
defined in the "Stored message" section later in this document so the
program doesn't have to support 4711 different message base formats.
The name of the program must be in the ToUser field.
Carbon Copy
-----------
The CC flag is used for sending a NetMail message to several nodes.
Which nodes is determined by the MsgDest field.
If the message is addressed to a Zone Coordinator, the message is
destined for all nodes in that zone. If the message is addressed to a
Region Coordinator, the message is destined for all nodes in that
region. If the message is addressed to a Net Coordinator, the message
is destined for all nodes in that net. If the message is addressed to
a HUB, the message is destined for all nodes under that HUB.
If the receiver of a CC message have other coordinators (or HUBs)
below, it must send the message to them as CC's too.
If the ToUser field is empty the message is considered to be addressed
to the SysOp and the name is taken from the nodelist (or set to
FIDONEWS 14-23 Page 18 9 Jun 1997
"SysOp"). This must be done by the system immediate before the
destination (usually the destination's HUB).
Permanent
---------
This flag indicates that the message must not be removed when old
messages is cleaned out.
A new message with this flag automatically erase an old message with
the same data in the Subject field. If you want to erase a permanent
message without replacing it with a new, then post an empty message
with the Permanent flag and the appropriate data in the Subject field.
This flag can only be used in EchoMail.
OrigAddr
--------
This field must contain the true origin address of the message in text
format followed by an "@" (40h) and the name of the originating
organization.
Message ID
----------
The origin address and MsgID fields are used as a unique message
identifier. How the MsgID field is generated is left to the
implementor, but it must be unique for each message generated on a
given node in at least three years. MsgID must normally not be zero,
zero is used to indicate lack of Message-ID. With this system these
two fields together is unique for every message, and can be used for
duplicate detection and other things.
Reply linkage information
-------------------------
In a reply the ReplyAddr and ReplyID fields must be identical to the
origin address, and MsgID fields in the replied message. A message
which is not a reply must have these fields empty. Use the ReplyAddr
field to check this.
Area
----
A list of one or more AreaTags in EchoMail, just a NUL in NetMail. If
the list contains more than one tag, they are separated by space. 00h
through 1Fh are not allowed in this field (except NUL as the
terminator).
Path
----
This field contains a series of addresses separated by space. The
first system must place its address in this field and every system
that routes the message must add its address to this field,
Note that the first address in this field and the address in the
MsgOrig field doesn't have to be the same.
The first address must be the origin address in this format:
zone:net/node.point@organization
FIDONEWS 14-23 Page 19 9 Jun 1997
In the other addresses organization, zone, net and node must be
omitted if same as the previous address.
The other addresses must be in one of these formats:
zone:net/node.point@organization
zone:net/node.point
net/node.point
node.point
.point
.point must be excluded if point is zero, except when .0 stands alone.
Example:
1:123/324@FidoNet sends a routed NetMail message to 2:224/546.5;
1:123/300, 1:123/0, 1:12/0, 1:1/2, 2:22/888, 2:22/0, 2:224/0,
2:224/546 and 2:224/546.3 routes the message (in that order). The path
field must in this case be "1:123/324@FidoNet 300 0 12/0 1/2 2:22/888
0 224/0 546 .3" when
2:224/546.5 receives the message. Note that the message is routed via
a point, that might not be so common but it's technically possible.
In EchoMail, the Path field can also contain addresses suffixed by an
exclamation mark ("!", 21h). This means that that node hasn't routed
the message, but the message has been sent to him. Similar to SEEN-
BY's in FTS-4. However, this should only be used when necessary.
Never send an EchoMail message to a node listed in the Path field;
regardless if the address is suffixed by an exclamation mark or not.
If the message originates in a non-FTN organization, the name of the
origin organization prefixed by an "@" (40h) must be placed before the
address of the gateway. In such cases there may also be some other FTN
addresses before the non-FTN organization name if the message have
travelled from an FTN, via a non-FTN and to a FTN again.
Example:
someone@one.two.three in InterNet sends a routed NetMail message to
1:222/345 in FidoNet via the gateway 1:222/111 and 1:222/300. The path
field must in this case be "@InterNet 1:222/111@FidoNet 300" when
2:222/345 receives the message.
If there's not enough room to update the Path field (add what you
should and have at least two bytes left), put a single "$" (24h) in it
instead (and a space between it and the last address).
This field has the same format as the PTH line specified in FSC-44
(except the "$"). Read FSC-44 for more information.
HeadExt
-------
This field contains zero or more NUL-terminated strings. The end of
this field can be determined by the HeadSize field, but there must be
a NUL after the last string anyway. If there are no strings here,
there must not be any NUL either.
Each string here is a header extension field. A header extension field
FIDONEWS 14-23 Page 20 9 Jun 1997
contains a keyword followed by a space and some data. A header
extension field can contain only a keyword with no data, in such case
a space must not be used either.
Inter-organization messages
---------------------------
To send a message to an other organization place the final address in
text format followed by an "@" (40h) and the name of the destination
organization in a header extension field with the keyword "DEST" and
address the message to a gateway.
If the message must travel over more than one organization-border, the
addresses to each gateway can be pointed out by header extension
fields with the keyword "ROUTE". ROUTE fields contains addresses in
the same format as DEST lines. The order of the ROUTE fields is
important and the DEST field must be after the ROUTE field(s). When
the gateway pointed by a ROUTE field processes the message it must
change "ROUTE" to "ROUTD".
Note: The gateway from your organization are pointed out by the
MsgDest field so there must not be a ROUTE field for that gateway.
Example:
You are 34:65/12@StrangeNet and want to send a message to
someone@one.two.three in InterNet. StrangeNet hasn't got any gateway
to InterNet, but FidoNet has gateways to both StrangeNet and InterNet.
In that case the message may have the following header extension
fields:
ROUTE 1:1/20@FidoNet
DEST someone@one.two.three@InterNet
Messages from other organizations (NetMail or EchoMail doesn't matter)
must have their origin addresses (including @organization as mentioned
before) stored in the OrigAddr field and the Foreign flag set. The
MsgOrig field in the header must contain the address of a
bidirectional gateway.
The MsgID field must be generated using the message-ID in the
originating organization, if that is possible. If the originating
network doesn't have any message-ID that can be used to create the
MsgID field, the MsgID field must be set to zero. If two identical
messages (with identical message-ID) enters an FTN organization at two
different gateways, they should get the same MsgID. The same counts
for ReplyID. ReplyAddr must also be transferred if present in the
original message.
If the other organization uses a message-ID format that can't be
transparently mapped to MsgID, a ORIGID header extension field is
created with a direct copy of the original message-ID (both address
and serial number). The same is done with reply-linkage information in
a ORIGREF header extension field. This information is used if the
message should be gated back to the original network.
Example with message from InterNet:
ORIGID <abcd43kxz@somewhere.org>
ORIGREF <bcdef43gkrt@elsewhere.org>
FIDONEWS 14-23 Page 21 9 Jun 1997
Message routing
---------------
The transport layer (including intermediate systems (systems handling
in-transit messages)) are not allowed to change anything in the
MsgDate, MsgID, ReplyID, MsgLength, CharSet, MsgType, OrigAddr,
ReplyAddr, FromUser, ToUser, Subject and MsgData fields. No flags may
be changed by the transport layer except the Foreign flag at gateways.
The only exception is if the message have to be converted to another
packet type.
An intermediate system must update the Path field, both in NetMail and
EchoMail.
In EchoMail, the Area field may be changed.
An intermediate system are allowed to add or change header extension
fields.
An intermediate system can add a header extension field with the
keyword "Via". The Via field contains information about the system and
when it processed the message. It's up to each network's policy to
decide if this is allowed in NetMail, EchoMail or both.
If the header is changed, the HeadSize field must be updated.
EchoMail
--------
This section lists the changes to FTS-4 needed to implement EchoMail
with this packet format.
SEEN-BY lines are not to be used. The Path field is used instead of
PATH lines. The Area field is used instead of the AREA line. The
MsgOrig and OrigAddr fields must contain the origin addresses of the
message. A unaddressed EchoMail message must have the ToUser field
empty, unless there is a good reason to put something there.
The MsgDest field must be used as in NetMail. If you receive a
EchoMail message not addressed to any of you addresses, you must
handle it as in-transit NetMail. This makes it possible to route
EchoMail through nodes not connected to the area. This can be
performed inter-organization as well.
Since the lack of complete SEEN-BY's, an EchoMail processor must use
the single-pass technique. That means that it must export a message to
all its downlinks at the same time as it tosses the message, before it
goes into the local message base (it doesn't even have to get there if
the area is pass-through). With this technique the tosser can do what
ever it wants with the message before it stores it in the local
message base since the message will never get out of it again (except
when a rescan function is invoked, but the requesting system will have
to stand that).
A system which receives an EchoMail message with the NoForward flag
set must not export that message. This flag is indented for EchoMail
processors with a rescan function, all rescanned messages must have
the NoForward flag set.
FIDONEWS 14-23 Page 22 9 Jun 1997
The tear and origin lines have no technical meaning (the origin
address is stored elsewhere) so no program is forced to create them.
Additionally, a program must not require them.
To distinguish EchoMail from NetMail, check the Area field. NetMail
messages have empty Area fields.
Cross-posting a message in several areas is preformed by storing
multiple AreaTags in the Area field. If some of your downlinks don't
have all the areas listed in the Area field then you must remove the
AreaTags for the areas they don't have. All copies must still have the
same MsgID. If you receive several messages with the same MsgID but
different Area then you must join them into a single message and put
all different AreaTags in the Area field (but not the same twice).
Compare all fields in the header up to and including Subject (except
Area) and not only MsgID.
When preforming dupchecking with MsgID, compare all fields in the
header up to and including Subject and not only MsgID.
CharSet
-------
Value Character set
----------------------------------------------------------------------
1..99 ISO 8859 (8 bit)
100 ISO 10646 16 bit (Unicode)
101..149 Reserved for other 16 bit character sets
150 ISO 10646 32 bit
151 PC8-437 (The Original)
152 PC8-850 (Multilingual)
153 PC8-852 (Slavic)
154 PC8-860 (Portuguese)
155 PC8-863 (Canadian-French)
156 PC8-865 (Nordic)
157..199 Reserved for other 8 bit character sets
200..255 reserved
PC8 means IBM's codepage (8 bit).
CharSet=1 means ISO 8859-1 (Latin-1), CharSet=2 means ISO 8859-2 and
so on.
CharSet concerns FromUser, ToUser and Subject. It may also concern
MsgData.
Combined characters are built by 02h followed by a modifier and the
base character. If you can't display the combined character, just
ignore the modifier and display the base character unmodified. A
combined character contains three bytes and are counted as three
bytes. See FSC-51 for more information on this. There are a few things
in FSC-51 that doesn't apply to this format: this method is allowed on
all 8 bit character sets, not only Latin-1, and the byte values 80h
through 9Fh are allowed. This can only be used for 8 bit character
sets. Combined character can be used in FromUser, ToUser and Subject,
it may also be allowed in MsgData.
FIDONEWS 14-23 Page 23 9 Jun 1997
MsgLength, MsgType and MsgData
------------------------------
If the MsgData field contains nothing (MsgLength is zero), it's an
empty message. An empty message must be forwarded and routed as any
other message. An empty message must not be stored in the local
message base (but read about the Permanent flag).
If MsgType is zero, MsgData is defined by the "Message text" part of
this document.
If MsgType is non-zero, the MsgData field is not defined by this
document.
Message text
============
This part defines the presentation layer.
The CharSet field in the header concerns the message text except
binary extension fields. Combined characters can be used in the
message text except in binary extension fields.
If a 16 or 32 bit character set is used all characters are two or four
bytes so all control codes must be prefixed by 00h or 00h 00h 00h. The
bytes alone can be in printable character. The length of binary
extension fields is still counted in bytes.
All 256 byte values (including NUL) are accepted in the message text.
00h through 1Fh are control codes and must not be used to represent
printable characters.
A paragraph (also called "physical line") is ended with CR.
8Dh (sometimes called "Soft CR") must not be used as a line separator
since it represents a printable character in some character sets.
01h first at a physical line (i.e. the first character of the message
text or the character immediately after a CR) means that this line is
a extension line. See below for more information.
00h first at a physical line (except in another binary extension
field) indicates the start of an long binary extension field. 00h is
followed by a LongInt and up to almost 4 GigaBytes of binary data. A
binary extension field is not terminated in any way, it's length is
stored in the LongInt (the 00h and the LongInt itself is not included
in the length).
15h first at a physical line (except in another binary extension
field) indicates the start of an short binary extension field. 15h is
followed by a ShortInt and up to 255 bytes of binary data. A binary
extension field is not terminated in any way, it's length is stored in
the ShortInt (the 15h and the Integer itself is not included in the
length).
Attributes:
03h = Turn off all attributes
04h = Bold
FIDONEWS 14-23 Page 24 9 Jun 1997
05h = Italic
06h = Underline
17h = All caps (lower case letters as small caps)
19h = Subscript
1Ah = Superscript
1Ch = Blinking
1Dh = Inverted
1Eh = Concealed
Subscript automatically turns off superscript and vice versa. All
other attributes can be used together. If an attribute already is on,
it's turned off by the same code again. If your system doesn't support
an attribute, just ignore it. CR turns off all attributes.
To quote a message begin a physical line with 1Fh followed by the
initials of the person you are quoting and another 1Fh. Use just two
1Fh if you don't want any initials. Successive quoting is marked with
more 1Fh:s immediate after the two first ones. A quote is ended with
CR. It's up to each implementor to decide how to display quoted text,
but it must be possible to distinguish it from normal text. It's
recommended to display it in another color if possible. You must
translate the quote to the same character set used in the rest of the
message.
The last paragraph of the message text must be terminated by a CR
(i.e. the last character of the message text must be a CR unless a
binary extension field is last).
Extension lines
---------------
An extension line contains a keyword followed by a space and some
data. A extension line can contain only a keyword with no data, in
such case a space must not be used either. An extension line is ended
like a paragraph.
Extension lines may not contain 00h through 1Fh. If you want binary
data, use a binary extension field instead.
Extension lines are control information any should not be displayed to
the user. If you want "hidden lines", then use the Concealed attribute
rather than an extension line.
Information that is relevant for the transport layer must be placed in
a header extension field rather than in an extension line.
Extension lines can be useful for describing a binary extension field.
Currently defined extension lines
---------------------------------
A extension line with the keyword FILE is used for sending files
embedded in the message text. The keyword is followed by a eight digit
uppercase hexadecimal number containing a TimeStamp for the file, a
space and the filename. The filename can contain all chars valid for
extension lines (including space) and must be at least 1 char and at
most 255 chars. The file is stored in a binary extension field
immediate after the FILE line. Examples:
FILE AB34F657 FILE.EXT
FIDONEWS 14-23 Page 25 9 Jun 1997
FILE 1234ABCD This is a filename
Stored message
==============
This is a description of the application layer, the local message
base.
It is recommended to use this format to store NetMail messages
locally. It can also be used for EchoMail, but that's not necessary.
Each message is stored as a single file which must have a hexadecimal
number from 00000001 to FFFFFFFF as the base name and the extension
MS3 (to distinguish from TYPE-2 stored messages).
Messages can be stored in two ways. Either the same way as TYPE-2 with
one directory for each area (including NetMail), in that case the Area
field must be empty in all messages. Or all messages in the same
directory with the area field used to indicate what/which area the
message belongs to (or empty to indicate NetMail). The second format
is useful if you normally store EchoMail in an other format and only
use this format for messages with the Machine flag.
Field Type Description
----------------------------------------------------------------------
SRdate TimeStamp When the message was sent or received
(see below).
ReplyTo LongInt Message which this replies (see below).
Reply1st LongInt First reply to this message (see below).
ReplyNext LongInt Next reply to this message (see below).
LocalFlags Word Local flags (see below).
Cost Integer Cost of sending in the lowest currency
unit.
HeadSize Integer Size of the message header (see below).
MsgFlags Word Same as packed message.
MsgDate TimeStamp Same as packed message.
MsgID LongInt Same as packed message.
ReplyID LongInt Same as packed message.
MsgLength LongInt Same as packed message.
MsgOrig Address Same as packed message.
MsgDest Address Same as packed message.
CharSet ShortInt Same as packed message.
MsgType ShortInt Same as packed message.
Area String{255} AreaTag(s) (see above).
OrigAddr String{255} Same as packed message.
ReplyAddr String{255} Same as packed message.
FromUser String{255} Same as packed message.
ToUser String{255} Same as packed message.
Subject String{255} Same as packed message.
Path String{65535} Path (see below).
HeadExt String Same as packed message.
MsgData String Same as packed message.
HeadSize
--------
The total size of the message header (all fields except MsgData).
Since this is an Integer, the header can't be bigger than 65535 bytes
FIDONEWS 14-23 Page 26 9 Jun 1997
and Path can never reach it's maximum length (how big it can be
depends on how big the rest of the header is).
Please note that this won't contain the same value when the same
message is placed in a packet because SRdate, LocalFlags, ReplyTo,
Areply and Cost isn't included then and Area might not have the same
length.
Local flags
-----------
Bit Flag Meaning
----------------------------------------------------------------------
0 Local Message is created locally.
1 InTransit Message is not destined for this system.
2 Orphan Unknown destination.
3 KillSent Remove message after it has been sent.
4 DelSent Delete attached file(s) after they have been sent.
5 TruncSent Truncate attached file(s) after they have been
sent.
6 Sent Message has been sent.
7 Read Message has been read by the SysOp.
8 Rcvd Message has been read by its addressee.
9 Lock Lock the message for further access.
10 DontSend Do not send the actual message but send attached
files, make file requests and poll the destination
if necessary.
11 unused Reserved for future extension.
12 unused Reserved for future extension.
13 unused Reserved for future extension.
14 unused Reserved for future extension.
15 unused Reserved for future extension.
Note that "sent" also can mean "picked up".
SRdate
------
The meaning of this field is determined by the Local and Sent flags.
Local but not Sent: Meaningless, must be zero.
Local and Sent: When the message was sent or picked up.
Not Local: When the message arrived to this system.
Reply linking
-------------
The ReplyTo field points at the message which the current message
replies. The Reply1st field points at the first reply to the current
message (the reply with lowest number); a messages with no replies
must have this field set to zero. The ReplyNext field points at the
next reply the same message as the current message; this field must be
zero if there are no more replies to the message the current message.
A message which is no reply must have the ReplyTo and ReplyNext fields
set to zero.
With this system there is possible to keep track of an unlimited
number of replies to any message.
Path
FIDONEWS 14-23 Page 27 9 Jun 1997
----
If the local flag is set, this field must be empty. It's the mail
processors responsibility to insert the address here when placing the
message in a packet.
When the mail processor tosses an incoming message, it must copy the
Path field from the packet.
Control file
------------
In each message directory (both EchoMail and NetMail) there must be a
file named LASTREAD. When an area is renumbered, this file must be
updated.
Field Type Description
----------------------------------------------------------------------
LastRead LongInt The last message read.
HighRead LongInt The highest message read.
HighWater LongInt High-water mark (only used with EchoMail).
This field is used by the EchoMail
processor to store the number of the last
scanned message.
Notes
=====
If you are implementing this and something confuses you, ask someone
who knows. Please don't guess how it should be.
Credits
=======
Thanks to Krister Hansson-Renuad, Johan Olofsson, Nils Hammar, Jonas
Hogstrom, Mats Gefvert and others who have helped me developing this.
-----------------------------------------------------------------
FIDONEWS 14-23 Page 28 9 Jun 1997
=================================================================
COORDINATORS CORNER
=================================================================
Nodelist-statistics as seen from Zone-2 for day 157
By Ward Dossche, 2:292/854
ZC/2
+----+------+------------+------------+------------+------------+--+
|Zone|Nl-129|Nodelist-136|Nodelist-143|Nodelist-150|Nodelist-157|%%|
+----+------+------------+------------+------------+------------+--+
| 1 | 8430| 8367 -63 | 8277 -90 | 8277 0 | 8182 -95 |31|
| 2 | 15904|15879 -25 |15855 -24 |15835 -20 |15774 -61 |60|
| 3 | 800| 800 0 | 761 -39 | 765 4 | 758 -7 | 3|
| 4 | 543| 543 0 | 543 0 | 543 0 | 519 -24 | 2|
| 5 | 87| 87 0 | 87 0 | 87 0 | 87 0 | 0|
| 6 | 1083| 1083 0 | 1077 -6 | 1078 1 | 1078 0 | 4|
+----+------+------------+------------+------------+------------+--+
| 26847|26759 -88 |26600 -159 |26585 -15 |26398 -187 |
+------+------------+------------+------------+------------+
-----------------------------------------------------------------
FIDONEWS 14-23 Page 29 9 Jun 1997
=================================================================
NET HUMOR
=================================================================
Date: Sun, 25 May 1997 22:08:50 -0700
From: Shari <bluedawg@concentric.net>
Organization: OREGON - USA
To: webheads@softdisk.com
CC: Jayodee@aol.com
Subject: NEVERMORE
Sender: owner-webheads@softdisk.com
Reply-To: webheads@softdisk.com
Once upon a midnight dreary, fingers cramped and vision bleary,
System manuals piled high and wasted paper on the floor,
Longing for the warmth of bedsheets,
Still I sat there, doing spreadsheets:
Having reached the bottom line,
I took a floppy from the drawer.
Typing with a steady hand, I then invoked the SAVE command
But got instead a reprimand: it read "Abort, Retry, Ignore."
Was this some occult illusion? Some maniacal intrusion?
These were choices Solomon himself had never faced before.
Carefully, I weighed my options.
These three seemed to be the top ones.
Clearly, I must now adopt one:
Choose Abort, Retry, Ignore.
With my fingers pale and trembling,
Slowly toward the keyboard bending,
Longing for a happy ending, hoping all would be restored,
Praying for some guarantee
Finally I pressed a key --
But on the screen what did I see?
Again: "Abort, Retry, Ignore."
I tried to catch the chips off-guard --
I pressed again, but twice as hard.
Luck was just not in the cards.
I saw what I had seen before.
Now I typed in desperation
Trying random combinations
Still there came the incantation:
Choose: Abort, Retry, Ignore.
There I sat, distraught, exhausted, by my own machine
accosted Getting up I turned away and paced across the
office floor. And then I saw an awful sight:
A bold and blinding flash of light --
A lightning bolt had cut the night and shook me to my very core.
I saw the screen collapse and die
"Oh no -- my database", I cried
I thought I heard a voice reply,
"You'll see your data Nevermore."
FIDONEWS 14-23 Page 30 9 Jun 1997
To this day I do not know
The place to which lost data goes
I bet it goes to heaven where the angels have it stored.
But as for productivity, well
I fear that it goes straight to hell
And that's the tale I have to tell
Your choice: Abort, Retry, Ignore.
-30-
-----------------------------------------------------------------
FIDONEWS 14-23 Page 31 9 Jun 1997
=================================================================
NOTICES
=================================================================
Future History
12 Jun 1997
Independence Day, Russia.
1 Jul 1997
Canada Day - Happy Birthday Canada.
9 Jul 1997
Independence Day, Argentina.
1 Aug 1997
International FidoNet PENPAL [Echo] meeting in Dijon, France
13 Oct 1997
Thanksgiving Day, Canada.
1 Dec 1997
World AIDS Day.
10 Dec 1997
Nobel Day, Sweden.
12 Jan 1998
HAL 9000 is one year old today.
22 May 1998
Expo '98 World Exposition in Lisbon (Portugal) opens.
1 Dec 1998
Fifteenth Anniversary of release of Fido version 1 by
Tom Jennings.
31 Dec 1999
Hogmanay, Scotland. The New Year that can't be missed.
1 Jan 2000
The 20th Century, C.E., is still taking place thru 31 Dec.
15 Sep 2000
Sydney (Australia) Summer Olympiad opens.
1 Jan 2001
This is the actual start of the new millennium, C.E.
-- If YOU have something which you would like to see in this
Future History, please send a note to the FidoNews Editor.
-----------------------------------------------------------------
FIDONEWS 14-23 Page 32 9 Jun 1997
=================================================================
FIDONET SOFTWARE LISTING
=================================================================
[The SOF Keeper is out of town this week. Here's last week's
edition.] Ed.
Latest Greatest Software Versions
by Peter E. Popovich, 1:363/264
A fairly quiet week around here. Things seems to be settling down into
some sense of order...
-=- Snip -=-
Submission form for the Latest Greatest Software Versions column
OS Platform :
Software package name :
Version :
Function(s) - BBS, Mailer, Tosser, etc. :
Freeware / Shareware / Commercial? :
Author / Support staff contact name :
Author / Support staff contact node :
Magic name (at the above-listed node) :
Please include a sentence describing what the package does.
Please send updates and suggestions to: Peter Popovich, 1:363/264
-=- Snip -=-
MS-DOS:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
Act-Up 4.6 G D Chris Gunn 1:15/55 ACT-UP
ALLFIX 4.40 T S Harald Harms 2:281/415 ALLFIX
Announcer 1.11 O S Peter Karlsson 2:206/221 ANNOUNCE
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BDOS_260.ZIP
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_DOS
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
CheckPnt 1.0a O G Michiel vd Vlist 2:500/9 CHECKPNT
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FASTECHO
FastEcho/16 1.45a T S Tobias Burchhardt 2:2448/400 FE16
FidoBBS (tm) 12u B S Ray Brown 1:1/117 FILES
FrontDoor 2.12 M S JoHo 2:201/330 FD
FrontDoor 2.20c M C JoHo 2:201/330 FDINFO
GEcho 1.00 T S Bob Seaborn 1:140/12 GECHO
GEcho/Plus 1.11 T C Bob Seaborn 1:140/12 GECHO
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
GoldED 2.50 O S Len Morgan 1:203/730 GED
GoldED/386 2.50 O S Len Morgan 1:203/730 GEX
FIDONEWS 14-23 Page 33 9 Jun 1997
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
Imail 1.75 T S Michael McCabe 1:1/121 IMAIL
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
InfoMail/86 1.21 O F Damian Walker 2:2502/666 INFOMAIL
InfoMail/386 1.21 O F Damian Walker 2:2502/666 INFO386
InterEcho 1.19 T C Peter Stewart 1:369/35 IEDEMO
InterMail 2.29k M C Peter Stewart 1:369/35 IMDEMO
InterPCB 1.52 O S Peter Stewart 1:369/35 INTERPCB
IPNet 1.11 O S Michele Stewart 1:369/21 IPNET
JD's CBV 1.4 O S John Dailey 1:363/277 CBV
Jelly-Bean 1.01 T S Rowan Crowe 3:635/727 JELLY
Jelly-Bean/386 1.01 T S Rowan Crowe 3:635/727 JELLY386
JMail-Hudson 2.81 T S Jason Steck 1:285/424 JMAIL-H
JMail-Goldbase 2.81 T S Jason Steck 1:285/424 JMAIL-G
MakePl 1.9 N G Michiel vd Vlist 2:500/9 MAKEPL
Marena 1.1 beta O G Michiel vd Vlist 2:500/9 MARENA
Maximus 3.01 B P Tech 1:249/106 MAX
McMail 1.0 M S Michael McCabe 1:1/148 MCMAIL
MDNDP 1.18 N S Bill Doyle 1:388/7 MDNDP
Msged 4.10 O G Andrew Clarke 3:635/728 MSGED41D.ZIP
Msged/386 4.10 O G Andrew Clarke 3:635/728 MSGED41X.ZIP
Opus CBCS 1.79 B P Christopher Baker 1:374/14 OPUS
O/T-Track 2.66 O S Peter Hampf 2:241/1090 OT
PcMerge 2.8 N G Michiel vd Vlist 2:500/9 PCMERGE
PlatinumXpress 1.3 M C Gary Petersen 1:290/111 PX13TD.ZIP
QuickBBS 2.81 B S Ben Schollnick 1:2613/477 QUICKBBS
RAR 2.00 C S Ron Dwight 2:220/22 RAR
RemoteAccess 2.50 B S Mark Lewis 1:3634/12 RA
Silver Xpress
Door 5.4 O S Gary Petersen 1:290/111 FILES
Reader 4.4 O S Gary Petersen 1:290/111 SXR44.ZIP
Spitfire 3.51 B S Mike Weaver 1:3670/3 SPITFIRE
Squish 1.11 T P Tech 1:249/106 SQUISH
StealTag UK 1.c... O F Fred Schenk 2:284/412 STEAL_UK
StealTag NL 1.c... O F Fred Schenk 2:284/412 STEAL_NL
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL
Telegard 3.02 B F Tim Strike 1:259/423 TELEGARD
Terminate 4.00 O S Bo Bendtsen 2:254/261 TERMINATE
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
TosScan 1.01 T C JoHo 2:201/330 TSINFO
TransNet 1.00 G S Marc S. Ressl 4:904/72 TN100ALL.ZIP
TriBBS 11.0 B S Gary Price 1:3607/26 TRIBBS
TriDog 11.0 T F Gary Price 1:3607/26 TRIDOG
TriToss 11.0 T S Gary Price 1:3607/26 TRITOSS
WaterGate 0.92 G S Robert Szarka 1:320/42 WTRGATE
WWIV 4.24a B S Craig Dooley 1:376/126 WWIV
WWIVTOSS 1.36 T S Craig Dooley 1:376/126 WWIVTOSS
xMail 2.00 T S Thorsten Franke 2:2448/53 XMAIL
XRobot 3.01 O S JoHo 2:201/330 XRDOS
OS/2:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
ALLFIX/2 1.10 T S Harald Harms 2:281/415 AFIXOS2
BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX
FIDONEWS 14-23 Page 34 9 Jun 1997
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BOS2_260.ZIP
BinkleyTerm-XE XR4 M F Thomas Waldmann 2:2474/400 BTXE_OS2
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
FastEcho 1.45a T S Tobias Burchhardt 2:2448/400 FE2
FleetStreet 1.19 O S Michael Hohner 2:2490/2520 FLEET
GEcho/Pro 1.20 T C Bob Seaborn 1:140/12 GECHO
GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO
GoldED 2.50 O S Len Morgan 1:203/730 GEO
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
GoldNODE 2.50 O S Len Morgan 1:203/730 GEN
ImCrypt 1.04 O G Michiel vd Vlist 2:500/9 IMCRYPT
Maximus 3.01 B P Tech 1:249/106 MAXP
Msged/2 4.10 O G Andrew Clarke 3:635/728 MSGED41O.ZIP
PcMerge 2.3 N G Michiel vd Vlist 2:500/9 PCMERGE
RAR 2.00 C S Ron Dwight 2:220/22 RAR2
Squish 1.11 T P Tech 1:249/106 SQUISHP
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL2
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
XRobot 3.01 O S JoHo 2:201/330 XROS2
Windows (16-bit apps):
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
FrontDoor APX 1.12 P S Mats Wallin 2:201/329 FDAPXW
Windows (32-bit apps):
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
Argus 95 2.62 M S Max Masyutin 2:469/77 ARGUS95
Argus NT 2.62 M S Max Masyutin 2:469/77 ARGUSNT
Argus NT/IP 2.62 M S Max Masyutin 2:469/77 ARGUSIP
BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL
Binkley Docs 2.60 M F Bob Juge 1:1/102 BDOC_260.ZIP
BinkleyTerm 2.60 M F Bob Juge 1:1/102 BW32_260.ZIP
CFRoute 0.92 O G C. Fernandez Sanz 2:341/70 CFR
GoldED 2.50 O S Len Morgan 1:203/730 GEO
GoldED Docs 2.50 O S Len Morgan 1:203/730 GEM
Maximus 3.01 B P Tech 1:249/106 MAXN
Msged/NT 4.10 O G Andrew Clarke 3:635/728 MSGED41W.ZIP
PlatinumXpress 2.00 M C Gary Petersen 1:290/111 PXW-INFO
T-Mail 2.599I M S Ron Dwight 2:220/22 TMAILNT
WinFOSSIL/95 1.12 r4 F S Bryan Woodruff 1:343/294 WNFOSSIL.ZIP
WinFOSSIL/NT 1.0 beta F S Bryan Woodruff 1:343/294 NTFOSSIL.ZIP
Unix:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
ifmail 2.10 M G Eugene Crosser 2:293/2219 IFMAIL
ifmail-tx ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX
ifmail-tx.rpm ...tx8.2 M G Pablo Saratxaga 2:293/2219 IFMAILTX.RPM
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
Amiga:
FIDONEWS 14-23 Page 35 9 Jun 1997
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
CrashMail 1.23 T X Fredrik Bennison 2:205/324 CRASHMAIL
CrashTick 1.1 O F Fredrik Bennison 2:205/324 CRASHTICK
DLG Pro BBOS 1.15 B C Holly Sullivan 1:202/720 DLGDEMO
GMS 1.1.85 M S Mirko Viviani 2:331/213 GMS
Msged 4.00 O G Paul Edwards 3:711/934 MSGED
Tobruk 0.33 T G Paul Edwards 3:711/934 TOBRUK
TrapDoor 1.86.b2 M S Maximilian Hantsch
2:310/6 TRAPDOOR
TrapDoor 1.86.b2 M S Maximilian Hantsch
2:310/6 TRAPBETA
TrapToss 1.50 T S Rene Hexel 2:310/6 TRAPTOSS
Atari:
Program Name Version F C Contact Name Node Magic Name
----------------------------------------------------------------------
ApplyList 1.00 N F Daniel Roesen 2:2432/1101 APLST100.LZH
BinkleyTerm/ST 3.18pl2 M F Bill Scull 1:363/112 BINKLEY
BTNC 2.00 N G Daniel Roesen 2:2432/1101 BTNC
JetMail 0.99beta T S Joerg Spilker 2:2432/1101 JETMAIL
Semper 0.80beta M S Jan Kriesten 2:2490/1624 SMP-BETA
Function: B-BBS, P-Point, M-Mailer, N-Nodelist, G-Gateway, T-Tosser,
C-Compression, F-Fossil, O-Other. Note: Multifunction will
be listed by the first match.
Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial,
X-Crippleware, D-Demoware, G-Free w/ Source
Please send updates and suggestions to: Peter Popovich, 1:363/264
-----------------------------------------------------------------
FIDONEWS 14-23 Page 36 9 Jun 1997
=================================================================
FIDONEWS PUBLIC-KEY
=================================================================
[this must be copied out to a file starting at column 1 or
it won't process under PGP as a valid public-key]
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.2
Comment: Clear-signing is Electronic Digital Authenticity!
mQCNAzINVLcAAAEEAM5dZN6t6j5Yc0kl7qegVFfiBeVoteuhDg4ay8h43u38Q4kO
eJ9Mm7J89wXFb9vgouBVb4biIN6bTWCwcXTbGhBe5OIceLvluuxuEKsaIs/UwXNe
Ogx5azIPhRfC7MJDe41Z8tMEBuHY/NE88cuxQ8yXWO126IRttavu6L/U5BwRAAUR
tCRGaWRvTmV3cyBFZGl0b3IgPDE6MS8yM0BmaWRvbmV0Lm9yZz6JAJUDBRAyGwFS
JZMgw7eCKz0BAZl0A/9xrfhpsEOqGiPfjy2qd9dv6tvSVPPVFu+Wy1lGTHYtuTtg
FIN3fQ47AM3XzqHxWRWvp/xZYgR6sRICL7UFx94ShYBQc7CyqBBZKA0IvIWqXP/g
c4Br+gQJR6CLiQK7TUyjUbqNbs6QAxuNUi4xFQM+O2Gene5/iTjHFmmSDj2C9YkB
FQMFEDIOmHDTQ6/52IG1SQEBQ78H/Rz/mleIrtZwFIOhzy3JH4Z6FUTfZuM9nPcs
1ZLjZCPptHvY7wEYJWGr03lPPJ6tj1VBXwTrWJTf/hOLsoi00GKV8t1thjqGDo23
O91/bSQ+Vn0vBQ2vOEJys8ftxdoLJAyI5YLzHVT+RsMTQLIXVuPyrNcKs1vC2ql+
UDHpU1R+9cG9JUEHpGI6z0DPnQ74SKbQH3fiVBpHhYx4BmvcBC4gWQzKMkDWFiq3
8AssIZ7b9lWl3OBgQ4UM1OIDKoJyjRewIdKyl7zboKSt6Qu8LrcsXO3kb81YshOW
ZpSS3QDIqfZC4+EElnB15l4RcVwnPHBaQY0FxUr4Vl4UWM36jbuJAJUDBRAyDpgY
q+7ov9TkHBEBAQGoA/sFfN07IFQcir456tJfBfB9R5Z6e6UKmexaFhWOsLHqbCq6
3FGXDLeivNn6NTz81QeqLIHglTuM3NP1mu8sw215klAG8G3M1NA2xLw7Eqhspze2
raGvNeEwxl8e+PY9aZwBj4UWU+CmIm6QNiP0MtvR7QYDIKn5mZCDc3CLmr942IkB
FQMFEDIOh0O8AhTPqRipPQEB4EYH/1gkDmdHL6lbEkFuQLrylF+weBl0XQ+kv7ER
vWXYrvIrkppxtc4VAge6CXXEbOGJnvkFHgyNZzO9Q9O64QsmZvjip+4lhDLeNrdH
X9DizS4YKXxkSKr9Yltmn2/AlBCx6jwcDIfkqy/P1tNWcikxZZMd6KryK0Wsres9
Ik12OmVmJjQSxb5bS6Q8aYUbV3qwosGXTqy+BzYh/UYAX/XJIWa5kxFVSPKFSZ+5
toiSzANd9SpHPEogGvQDHJlJ23lmsMx/6uHsR1LTsQ8su8zIk92XyqePJTjlMx2j
D7KJWNR7Zzu4QHCXBkga5W8l2FfPk7D3+o7bXTLRuR1yTYGdNoiJAJUCBRAyDhwt
SlKLwP4OFW0BAdaMA/9rcWQlSq44K9JuJ7fZUgt9fwxGreTud9fC8DvlbUW79+CA
AHLTLLagcEF1OKsWzVBWcA2JEAp+TUTqktRN0oD8vnaw3uNJd1G5KK59hw0WR8x1
v4ivypbSjiq95Y3gBunb7WjpyiFRWDlm0PrKrWHtbWzjnpPIpetln1UuqsSfbokB
FQIFEDIOG9C3N61ZQ4Dr/QEBIzMH/1VxxztmBPBszbjZLDO8Svcax9Ng8IcWpcDy
WqHCAA2Hoe5VtMD0v6w31ZgVqTPIvCark2Y/aTR1GofiuN9NUqbVV534AgAYLzYk
DMT1swsPvqDTpOYgQl6PCGh6A5JGAbWJfKkX9XCUHJAAmiTsEVRNnjOgL+p6qjoh
EfIG8CGehghWSRKl5eGeDAtbXupZKNjFI1t2XV+ks0RFQ/RPuTH7pF7pk7WO6Cyg
+Dk2ZMgua0HRL1fXvHKb5Xzr3MVgsbAl5gP8ooIiD9MI/x5Irh3oo58VyoEZNBs/
Kz+drGFDPljcS6fdiVCFtYIzMrshY6YsfLi0aB8fwOvFtxgBqli0J0NocmlzdG9w
aGVyIEJha2VyIDwxOjE4LzE0QGZpZG9uZXQub3JnPrQoQ2hyaXN0b3BoZXIgQmFr
ZXIgPGNiYWtlcjg0QGRpZ2l0YWwubmV0Pg==
=61OQ
-----END PGP PUBLIC KEY BLOCK-----
File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the
Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone
1 ZMH at 1200-9600+ HST/V32B. The FidoNews key is also available on
the FidoNews homepage listed in the Masthead information.
-----------------------------------------------------------------
FIDONEWS 14-23 Page 37 9 Jun 1997
=================================================================
FIDONET BY INTERNET
=================================================================
This is a list of all FidoNet-related sites reported to the Editor as
of this appearance.
============
FidoNet:
Homepage http://www.fidonet.org
FidoNews http://ddi.digital.net/~cbaker84/fidonews.html
HTML FNews http://www.geocities.com/Athens/6894/
WWW sources http://www.scms.rgu.ac.uk/students/cs_yr94/lk/fido.html
FTSC page http://www2.blaze.net.au/ftsc.html
Echomail http://www.portal.ca/~awalker/index.html
WebRing http://ddi.digital.net/~cbaker84/fnetring.html
============
Zone 1: http://www.z1.fidonet.org
Region 10: http://www.psnw.com/~net205/region10.html
Region 11: http://oeonline.com/~garyg/region11/
Region 13: http://www.smalltalkband.com/st01000.htm
Region 14: http://www.netins.net/showcase/fidonet/
Region 15: http://www.smrtsys.com/region15/ [disappeared?]
Region 16: http://www.tiac.net/users/satins/region16.htm
Region 17: http://www.portal.ca/~awalker/region17.htm
REC17: http://www.westsound.com/ptmudge/
Region 18: http://www.citicom.com/fido.html
Region 19: http://www.compconn.net
============
Zone 2: http://www.z2.fidonet.org
ZEC2: http://fidoftp.paralex.co.uk/zec.htm [shut down?]
Zone 2 Elist: http://www.fidonet.ch/z2_elist/z2_elist.htm
Region 20: http://www.fidonet.pp.se (in Swedish)
Region 24: http://www.swb.de/personal/flop/gatebau.html (in German)
Region 25:
http://members.aol.com/Net254/
FIDONEWS 14-23 Page 38 9 Jun 1997
Region 27: http://telematique.org/ft/r27.htm
Region 29: http://www.rtfm.be/fidonet/ (in French)
Region 30: http://www.fidonet.ch (in Swiss)
Region 34: http://www.pobox.com/cnb/r34.htm (in Spanish)
REC34: http://pobox.com/~chr
Region 36: http://www.geocities.com/SiliconValley/7207/
Region 41: http://www.fidonet.gr (in Greek and English)
Region 48: http://www.fidonet.org.pl
============
Zone 3: http://www.z3.fidonet.org
============
Zone 4: (not yet listed)
Region 90:
Net 904: http://members.tripod.com/~net904 (in Spanish)
============
Zone 5: (not yet listed)
============
Zone 6: http://www.z6.fidonet.org
============
-----------------------------------------------------------------
FIDONEWS 14-23 Page 39 9 Jun 1997
=================================================================
FIDONEWS INFORMATION
=================================================================
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION -------
Editor: Christopher Baker
Editors Emeritii: Tom Jennings, Thom Henderson, Dale Lovell,
Vince Perriello, Tim Pozar, Sylvia Maxwell,
Donald Tees
"FidoNews Editor"
FidoNet 1:1/23
BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds)
more addresses:
Christopher Baker -- 1:18/14, cbaker84@digital.net
cbaker84@aol.com
cbaker84@msn.com
(Postal Service mailing address)
FidoNews Editor
P.O. Box 471
Edgewater, FL 32132-0471
U.S.A.
voice: 1-904-409-3040 [1400-2100 ET only, please]
[1800-0100 UTC/GMT]
------------------------------------------------------
FidoNews is published weekly by and for the members of the FIDONET
INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation
of individual articles contributed by their authors or their
authorized agents. The contribution of articles to this compilation
does not diminish the rights of the authors. OPINIONS EXPRESSED in
these articles ARE THOSE OF THE AUTHORS and not necessarily those of
FidoNews.
Authors retain copyright on individual works; otherwise FidoNews is
Copyright 1997 Christopher Baker. All rights reserved. Duplication
and/or distribution permitted for noncommercial purposes only. For
use in other circumstances, please contact the original authors, or
the Editor.
=*=*=*=*=*=*=*=*=
OBTAINING COPIES: The most recent issue of FidoNews in electronic
form may be obtained from the FidoNews Editor via manual download or
file-request, or from various sites in the FidoNet and Internet.
PRINTED COPIES may be obtained by sending SASE to the above postal
address. File-request FIDONEWS for the current Issue. File-request
FNEWS for the current month in one archive. Or file-request specific
back Issue filenames in distribution format [FNEWSEnn.ZIP] for a
FIDONEWS 14-23 Page 40 9 Jun 1997
particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP
where mmm = three letter month [JAN - DEC] and y = last digit of the
current year [7], i.e., FNWSFEB7.ZIP for all the Issues from Feb 97.
Annual volumes are available as FNEWSn.ZIP where n = the Volume number
1 - 14 for 1984 - 1997, respectively. Annual Volume archives range in
size from 48K to 1.4M.
INTERNET USERS: FidoNews is available via:
http://www.fidonet.org/fidonews.htm
ftp://ftp.fidonet.org/pub/fidonet/fidonews/
ftp://ftp.aminet.org/pub/aminet/comm/fido/
*=*=*
You may obtain an email subscription to FidoNews by sending email to:
jbarchuk@worldnet.att.net
with a Subject line of: subscribe fnews-edist
and no message in the message body. To remove your name from the email
distribution use a Subject line of: unsubscribe fnews-edist with no
message to the same address above.
*=*=*
You can read the current FidoNews Issue in HTML format at:
http://www.geocities.com/Athens/6894/
STAR SOURCE for ALL Past Issues via FTP and file-request -
Available for FReq from 1:396/1 or by anonymous FTP from:
ftp://ftp.sstar.com/fidonet/fnews/
Each yearly archive also contains a listing of the Table-of-Contents
for that year's issues. The total set is currently about 11 Megs.
=*=*=*=
The current week's FidoNews and the FidoNews public-key are now also
available almost immediately after publication on the Editor's new
homepage on the World Wide Web at:
http://ddi.digital.net/~cbaker84/fidonews.html
There are also links there to jim barchuk's HTML FidoNews source and
to John Souvestre's FTP site for the archives. There is also an email
link for sending in an article as message text. Drop on over.
=*=*=*=*=*=*=*=*=
A PGP generated public-key is available for the FidoNews Editor from
FIDONEWS 14-23 Page 41 9 Jun 1997
1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from
Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It
is also posted twice a month into the PKEY_DROP Echo available on the
Zone 1 Echomail Backbone.
*=*=*=*=*
SUBMISSIONS: You are encouraged to submit articles for publication in
FidoNews. Article submission requirements are contained in the file
ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable
from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators
also have copies of ARTSPEC.DOC. Please read it.
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141,
and are used with permission.
"Disagreement is actually necessary,
or we'd all have to get in fights
or something to amuse ourselves
and create the requisite chaos."
-Tom Jennings
-30-
-----------------------------------------------------------------