1183 lines
55 KiB
Plaintext
1183 lines
55 KiB
Plaintext
BTN: Birmingham Telecommunications News
|
|
COPYRIGHT 1990
|
|
|
|
June 1990 Volume 3, Issue 5
|
|
|
|
Table Of Contents
|
|
-----------------
|
|
Article Title Author
|
|
|
|
Policy Statement and Disclaimer................Staff
|
|
Editorial Column...............................Mark Maisel
|
|
Its' Not Too Late!!!...........................Ricky Morgan
|
|
Copyright Law..................................Jordan J. Breslow
|
|
PC-MENU MASTER: A Review.......................Radio Active
|
|
WWIV: Part 2 of 3..............................Duck Capps
|
|
Profile: Richard Foshee.......................Chris Mohney
|
|
PC Board 14.5 (beta) New and Enhanced Commands.David Terry
|
|
Known BBS Numbers..............................Staff
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Disclaimer and Statement of Policy for BTN
|
|
|
|
We at BTN try our best to assure the accuracy of articles and
|
|
information in our publication. We assume no responsibility for
|
|
damage due to errors, omissions, etc. The liability,if any for BTN, its
|
|
editors and writers, for damages relating to any errors or omissions,
|
|
etc., shall be limited to the cost of a one year subscription to BTN,
|
|
even if BTN, its editors or writers have been advised of the likelihood
|
|
of such damages occurring.
|
|
|
|
With the conclusion of that nasty business, we can get on with our
|
|
policy for publication and reproduction of BTN articles. We publish
|
|
monthly with a deadline of the fifteenth of the month prior to
|
|
publication. If you wish to submit an article, you may do so at any
|
|
time but bear in mind the deadline if you wish for your work to appear
|
|
in a particular issue. It is not our purpose to slander or otherwise
|
|
harm a person or reputation and we accept no responsibility for the
|
|
content of the articles prepared by our writers. Our writers own their
|
|
work and it is protected by copyright. We allow reprinting of articles
|
|
from BTN with only a few restrictions. The author may object to a
|
|
reprint, in which case he will specify in the content of his article.
|
|
Otherwise, please feel free to reproduce any article from BTN as long as
|
|
the source, BTN, is specified, and as long as the author's name and the
|
|
article's original title are retained. If you use one of our articles,
|
|
please forward a copy of your publication to:
|
|
|
|
Mark Maisel
|
|
Editor, BTN
|
|
221 Chestnut St.
|
|
BHM, AL 35210-3219
|
|
|
|
We thank you for taking the time to read our offering and we hope that
|
|
you like it. We also reserve the right to have a good time while doing
|
|
all of this and not get too serious about it.
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
N E W S F L A S H
|
|
|
|
For those of you who read BTN regularly, please pay
|
|
attention! Several boards in town that maintain
|
|
transfer ratios allow BTN to be downloaded freely
|
|
through ProDoor. You may download BTN from these
|
|
boards without penalty to your ratio. Among these
|
|
that I am aware of are CONNECTION, LZ BIRMINGHAM,
|
|
CHANNEL 8250, and Bus System. I am sure that
|
|
there are more of them out there.
|
|
|
|
If you are a sysop and you allow BTN to be downloaded
|
|
freely, please let me know via EzNet so that I can
|
|
post your board as a free BTN distributor. Thanks.
|
|
|
|
I am also looking for a new, more useful format for
|
|
the Known BBS List. Please send me your suggestions
|
|
via EzNet or upload them to Channel 8250, Bus, or
|
|
Crunchy Frog. The best way to demonstrate a
|
|
suggestion would be to edit the bbs list in this
|
|
issue and show how you want it to look. Should
|
|
there be more WWIV info, PC Board info, FidoNet
|
|
info, other networks and/or systems info???
|
|
|
|
Remember, I can't do it if you don't suggest it. I
|
|
gave up telepathy a few years ago.
|
|
|
|
MM
|
|
|
|
EVEN MORE NEWS!
|
|
|
|
There are two new boards in town worthy of note.
|
|
Alter-Ego, run by Lee & Maggie Harden has some,
|
|
well, weird conferences. It is definitely worth a
|
|
look. If you are a ProDoor freak, you will love
|
|
it. Camelot BBS is also a newcomer, so to speak.
|
|
Joe McDonald has pulled down Professional's BBS and
|
|
put up Camelot in its place. This is much more
|
|
than a facelift. He is now running Teleguard 2.5,
|
|
has more drive space, no subscriptions, and all are
|
|
welcome. Please give these new boards a call.
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Editorial
|
|
by Mark Maisel
|
|
|
|
The summer is upon us and the seasonal BBS lull has struck. The
|
|
local systems are, for the most part, pretty dead as far as messages go.
|
|
It is nothing to be alarmed about. It happens every year. Pretty soon,
|
|
the sysops will start griping about the kids tying up the boards playing
|
|
games and leaving weird messages. We are going to do our best to keep
|
|
publishing during the summer as we have in the past. I had thought that
|
|
this being self-employed business would have allowed me more time for
|
|
stuff like BTN. It has not, at least not yet. I am taking a week in
|
|
June to visit up north, much further north than Dean's home swamp. I am
|
|
also going to be gone to New England later in July and August. Yes, it
|
|
is nice. No, you can't accompany me. We will do our best to keep the
|
|
articles coming and you can help by writing a few yourself. Don't give
|
|
me that business about how you can't write. I have heard it too many
|
|
times. Just talk with your fingers. It works every time.
|
|
|
|
This issue is a good mix. We have humor, reviews, information
|
|
about software copyrights, articles on WWIV and PC Board BBS software,
|
|
and of course, the ole BTN Known BBS List. Please take the time to read
|
|
the articles that have been prepared for you and comment publicly on
|
|
them. We don't care if your comments are favorable or otherwise, we
|
|
just want to hear them. We can't possibly attempt to go on without
|
|
feedback from you. Well, we might attempt it but it will go much better
|
|
if we are an interactive publication. Thanks for taking the time!
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Its' not too late!!!
|
|
by Ricky Morgan
|
|
|
|
Well, here it is after midnight...again. The kids have long since
|
|
been in bed. My wife stumbled off after them not long ago. So what am I
|
|
still doing sitting here, staring bleary eyed at this stupid computer?
|
|
|
|
Sound familiar? If it does, you just may want to read on. I think
|
|
maybe I can furnish an answer for you.
|
|
|
|
I remember it as if it were only yesterday. I purchased a copy of
|
|
"Computer Shopper Magazine" just last year. I was enthralled by the
|
|
shear number of ads for computers, parts and peripherals. I leafed
|
|
through the hefty magazine, eyeing each ad with lecherous desire,
|
|
turning each page slowly. Hoping against hope that one day, soon, I
|
|
would be able to afford a better, faster machine than the one I owned.
|
|
It wasn't until later that I realized my credit rating wasn't the only
|
|
thing in danger from this simple looking magazine.
|
|
|
|
Unknown to me, laying innocently in the back of this cumbersome
|
|
magazine, lay a sleeping virus. Titled, innocently enough, "Bulletin
|
|
Boards."
|
|
|
|
I had been on CompuServe years ago during my Commodore 64 and 300
|
|
baud modem days but I found the system too slow and expensive for my
|
|
simple needs. But as time passed my work began to demanded that I was
|
|
more and more IBM literate. So I found I was able to use the work angle
|
|
in acquiring an IBM clone and a new 2400 baud modem. So it was with
|
|
naive curiosity that I decided to log on to one of these local
|
|
electronic bulletin boards. After all, unlike CompuServe, these boards
|
|
are free. Little did I suspect, as I anxiously logged onto The Pinson
|
|
Valley PCBoard, that I was changing the direction that my life and my
|
|
computer would take; perhaps forever.
|
|
|
|
I sat diligently reading all those warnings and notices for new
|
|
users. Scrutinizing each screen, I sat and watched in wonder, eyes
|
|
gleaming with excitement, as the glow from the CRT cast malevolent
|
|
shadows across the darkened room where I sat, hunched over the keyboard.
|
|
At the time, I saw a whole new world of information opening for me.
|
|
Unfortunately I was oblivious to the fact that, even at this early
|
|
stage, I was now entrapped in an addiction stronger than any drug.
|
|
|
|
It wasn't enough that Pinson Valley taunted me with all sorts of
|
|
information, messages and free, or semi-free, software. At the end of
|
|
the session, I was teased with "Numbers of other BBS's to call."
|
|
|
|
My heart pounded as I quickly jotted down each number. I was
|
|
surprised that there were more boards out there, just sitting, yearning
|
|
for me to call. If only I had known. There was still hope for me. Now
|
|
it's too late.
|
|
|
|
Within minutes each new number was in my dialing directory and I
|
|
began calling these other systems. I sat there and watched the program
|
|
(Procomm 2.4.2) dial each number over and over; waiting for an open
|
|
line. I sat on the edge of my chair listening intently as the modem
|
|
dialed number after number. If only I had listened closer I would have
|
|
noticed that my modem (I always keep the speaker on during dialing)
|
|
dialed each number with a sinister chuckle. It knew what I did not. I
|
|
was addicted.
|
|
|
|
I logged on and registered on each system. I couldn't help myself,
|
|
the questions were easy and the SySops asked for so little. It was an
|
|
easy way to pass computer time, plus, I vindicated myself by saying,
|
|
"Look at all the free software, the message bases. All the subjects that
|
|
were covered! Call the Birmingham News and cancel the subscription!" I
|
|
covertly schemed to put that money to good use. Upgrade!
|
|
|
|
Oh, I raped and pillaged a few of the first boards. Taking any file
|
|
that looked good but soon that wasn't enough. I started reading messages
|
|
and actually leaving my own. I started getting replies. I also started
|
|
seeing a lot of the same names from board to board. Did I ever once
|
|
suspect that this was because these people might be addicted to BBS's?
|
|
No. Had the thought crossed my mind, would I have taken action? No.
|
|
|
|
Months passed, I was registered on more BBS's than I could log onto
|
|
in any 24 hr. period. With the, so called, help a local SySop, who shall
|
|
remain nameless, I gained access to programs that would call and get
|
|
mail and files for me automatically. I didn't even have to be awake.
|
|
Finally, I could get some sleep. No longer would I spend endless hours
|
|
sitting in front of my screen listening to busy signals; praying
|
|
endlessly for an open line. Alas, I still found myself compelled to read
|
|
all those messages. It started cutting into less important things; work
|
|
and family.
|
|
|
|
I found that I became nervous and restless, even down right
|
|
irritable if I didn't get on at least three boards a day. It was
|
|
becoming impossible to even carry on an intelligent conversation with
|
|
someone who wasn't into "BBSing." I was a junkie. I still hadn't
|
|
realized what was happening. After repeated threats, from my wife, to
|
|
have the phone lines disconnected, I tried to cut back on the number of
|
|
boards I called. To compensate the loss, I started getting more involved
|
|
in the message bases; leaving longer and more detailed messages on the
|
|
few systems I let myself call. I even started trying to write articles
|
|
for the local newsletter (BTN). It still wasn't enough.
|
|
|
|
I started lugging my old Compaq into the hotel room with me when I
|
|
worked out of town. I accessed boards where ever and when ever I could.
|
|
This still wasn't enough.
|
|
|
|
I began talking to friends and associates about the BBS'. Trying to
|
|
get them addicted; I was turning into a pusher. First I would tease them
|
|
with files, then turn them on to the message bases. Always helping and
|
|
cajoling them to get ever deeper involved. Then, when I no longer could
|
|
resist the temptation to be more involved, I actually began
|
|
contemplating starting a board of my own; to feed my habit. It was then,
|
|
sometime after midnight one night, while I sat pouring over the DOCS for
|
|
setting up a BBS, that I realized what was happening. I sat there amid
|
|
pile upon pile of incomprehensible instructions and the seed of
|
|
realization dawned on me. What a fool I had been.
|
|
|
|
It's too late for me but I still can warn others. I believe a
|
|
computer intelligence, somewhere, has awaken and decided to take over
|
|
the world. For good or bad I can't say. It's plan is deceptively simple.
|
|
Get as many people involved in electronic communication as possible.
|
|
Offer them free software, conversation with intelligent and worldly
|
|
people, games, even worldwide mail echoes; no more long distance phone
|
|
calls. Entice them, tease them. Once converted they will convince others
|
|
to join. Soon you have a self-replicating virus pulling all of humanity
|
|
into and under it's control. By controlling the message bases and files,
|
|
it controls your thoughts, actions and...your computer.
|
|
|
|
How many times have you sat down at the computer to, "just waist a
|
|
few minutes," only to walk away hours later. Shaking your head and
|
|
wondering, "Where did all the time go?" Those little phosphor dots have
|
|
a strangely hypnotic effect. What all did you do while you were
|
|
hypnotized by the computer? Notice any long distance calls on your phone
|
|
bill last month that you're SURE you didn't make? Notice any new files
|
|
on your hard disk that you don't remember downloading? Can you really
|
|
trust Norton Utilities to tell you the truth?
|
|
|
|
Do you really know what your computer does at night after you've
|
|
gone to bed? How do you know that those files you've gotten off some
|
|
board aren't covertly running your computer. Using your computer to call
|
|
others after you've left for work. Spreading itself relentlessly.
|
|
|
|
It's not too late. You can still escape. Don't log on to another
|
|
BBS. Toss your modem in the trash. Wipe your hard disk of any and all
|
|
software gleaned from BBS'. Then low level format the sucker! It's your
|
|
only hope. Good luck!
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
The following is reprinted with permission from CPU/STR 16/32bit
|
|
Magazine, No. 4.19, May 11, 1990. It has been split into two parts of
|
|
which this is part one. This part ends with Chapter 1. MM
|
|
|
|
Copyright Law
|
|
=============
|
|
|
|
Jordan J. Breslow
|
|
1225 Alpine Road, Suite 200
|
|
Walnut Creek, CA 94596
|
|
+1 415 932 4828
|
|
|
|
I am an attorney practicing copyright law and computer law. I read
|
|
a series of queries in net.legal about copyright law and was dismayed to
|
|
find that people who had no idea what they were talking about were
|
|
spreading misinformation over the network. Considering that the
|
|
penalties for copyright infringement can include $50,000.00 damages per
|
|
infringed work, attorneys fees, court costs, criminal fines and
|
|
imprisonment, and considering that ignorance is no excuse and innocent
|
|
intent is not even a recognized defense, I cringe to see the network
|
|
used as a soapbox for the ill-informed. For that reason, this article
|
|
will discuss copyright law and license law as they pertain to computer
|
|
software.
|
|
|
|
My goal is to enable readers to determine when they should be
|
|
concerned about infringing and when they can relax about it. I also want
|
|
to let programmers know how to obtain copyright for their work. I'll
|
|
explain the purpose of software licenses, and discuss the effect that
|
|
the license has on copyright. For those of you who are programmers,
|
|
I'll help you decide whether you own the programs you write on the job
|
|
or your boss owns them. I will also mention trademark law and patent
|
|
law briefly, in order to clarify some confusion about which is which.
|
|
Incidentally, if you read this entire essay, you will be able to
|
|
determine whether or not the essay is copyrighted and whether or not you
|
|
can make a printout of it.
|
|
|
|
This is a long article, and you may not want to read all of it.
|
|
Here is an outline to help you decide what to read and what to ignore:
|
|
|
|
1. The Meaning of Copyright from the Viewpoint of the Software User
|
|
|
|
1.1 A bit of history
|
|
1.2 The meaning of copyright
|
|
1.3 The meaning of public domain
|
|
1.4 A hypothetical software purchase
|
|
1.5 Can you use copyrighted software?
|
|
1.6 Can you make a backup copy?
|
|
1.7 Licenses may change the rules
|
|
|
|
(C) Copyright 1986 Breslow, Redistributed by permission
|
|
|
|
2. Copyright Sounds Neat -- How Do I Get One? Or, How Do I Know
|
|
If this Program is Copyrighted?
|
|
|
|
2.1 How do you get a copyright?
|
|
2.2 How do you lose a copyright?
|
|
2.3 How do you waste a stamp?
|
|
2.4 Do you have to register?
|
|
2.5 How copyright comes into existence
|
|
2.6 The copyright notice
|
|
2.7 Advantages of registration
|
|
2.8 A test to see if you understand this article
|
|
|
|
3. Who Owns The Program You Wrote?
|
|
|
|
3.1 Introduction
|
|
3.2 Programs written as an employee
|
|
3.3 Programs written as a contractor
|
|
|
|
4. A Brief Word about Licenses
|
|
|
|
4.1 Why a license?
|
|
4.2 Is it valid?
|
|
|
|
5. Trademarks and Patents
|
|
5.1 Trademark law explained
|
|
5.2 Patent law
|
|
|
|
6. Conclusion
|
|
|
|
1. The Meaning of Copyright from the Viewpoint of the Software
|
|
User
|
|
1.1. A bit of history
|
|
|
|
If you're not interested in history, you can skip this paragraph.
|
|
Modern copyright law first came into existence in 1570, by an act of
|
|
Parliament called the Statute of Anne. Like most laws, it hasn't
|
|
changed much since. It was written with books and pictures in mind.
|
|
Parliament, lacking the foresight to predict the success of the Intel
|
|
and IBM corporations, failed to consider the issue of copyrighting
|
|
computer programs.
|
|
|
|
At first, courts questioned whether programs could be copy- righted
|
|
at all. The problem was that judges couldn't read the programs and they
|
|
figured the Copyright Law was only meant to apply to things humans
|
|
(which arguably includes judges) could read without the aid of a
|
|
machine. I saw some mythical discussion about that in some of the
|
|
net.legal drivel. Let's lay that to rest: programs are copyrightable as
|
|
long as there is even a minimal amount of creativity. The issue was
|
|
laid to rest with the Software Act of 1980. That Act modified the
|
|
Copyright Act (which is a Federal law by the way), in such a way as to
|
|
make it clear that programs are copyrightable. The few exceptions to
|
|
this rule will rarely concern anyone. The next question to arise was
|
|
whether a program was copyrightable if it was stored in ROM rather than
|
|
on paper. The decision in the Apple v. Franklin case laid that to rest:
|
|
it is.
|
|
|
|
1.2. The meaning of copyright
|
|
|
|
Now, what is copyright? As it is commonly understood, it is the
|
|
right to make copies of something -- or to put it the other way around,
|
|
it is the right to prohibit other people from making copies. This is
|
|
known as an exclusive right -- the exclusive right to reproduce, in the
|
|
biological language of the Copyright Act -- and what most people don't
|
|
know is that copyright involves not one, not two, but five exclusive
|
|
rights. These are (1) the exclusive right to make copies, (2) the
|
|
exclusive right to distribute copies to the public, (3) the exclusive
|
|
right to prepare derivative works (I'll explain, just keep reading), (4)
|
|
the exclusive right to perform the work in public (this mainly applies
|
|
to plays, dances and the like, but it could apply to software), and (5)
|
|
the exclusive right to display the work in public (such as showing a
|
|
film).
|
|
|
|
1.3. The meaning of public domain
|
|
|
|
Before we go any further, what is public domain? I saw some
|
|
discussion on the net about public domain software being copyrighted.
|
|
Nonsense. The phrase public domain, when used correctly, means the
|
|
absence of copyright protection. It means you can copy public domain
|
|
software to your heart's content. It means that the author has none of
|
|
the exclusive rights listed above. If someone uses the phrase public
|
|
domain to refer to freeware (software which is copyrighted but is
|
|
distributed without advance payment but with a request for a donation),
|
|
he or she is using the term incorrectly. Public domain means no
|
|
copyright -- no exclusive rights.
|
|
|
|
1.4. A hypothetical software purchase
|
|
|
|
Let's look at those exclusive rights from the viewpoint of someone
|
|
who has legitimately purchased a single copy of a copyrighted computer
|
|
program. For the moment, we'll have to ignore the fact that the program
|
|
is supposedly licensed, because the license changes things. I'll
|
|
explain that later. For now, assume you went to Fred's Diner and
|
|
Software Mart and bought a dozen eggs, cat food and a word processing
|
|
program. And for now, assume the program is copyrighted.
|
|
|
|
1.5. Can you use copyrighted software?
|
|
|
|
What can you do with this copyrighted software? Let's start with
|
|
the obvious: can you use it on your powerful Timex PC? Is this a joke?
|
|
No. Prior to 1980, my answer might have been No, you can't use it!
|
|
|
|
People actually pay me for advice like that! Well think: you take
|
|
the floppy disk out of the zip lock baggy, insert it in drive A and load
|
|
the program into RAM. What have you just done? You've made a copy in
|
|
RAM -- in legalese, you've reproduced the work, in violation of the
|
|
copyright owner's exclusive right to reproduce. (I better clarify
|
|
something here: the copyright owner is the person or company whose name
|
|
appears in the copyright notice on the box, or the disk or the first
|
|
screen or wherever. It may be the person who wrote the program, or it
|
|
may be his boss, or it may be a publishing company that bought the
|
|
rights to the program. But in any case, it's not you. When you buy a
|
|
copy of the program, you do not become the copyright owner. You just
|
|
own one copy.)
|
|
|
|
Anyway, loading the program into RAM means making a copy. The
|
|
Software Act of 1980 addressed this absurdity by allowing you to make a
|
|
copy if the copy "is created as an essential step in the utilization of
|
|
the computer program in conjunction with a machine and ... is used in
|
|
no other manner ...." By the way, somebody tell me what a machine means.
|
|
If you connect 5 PC's on a network is that a machine or several
|
|
machines? A related question is whether or not running software on a
|
|
network constitutes a performance. The copyright owner has the
|
|
exclusive right to do that, remember?
|
|
|
|
1.6. Can you make a backup copy?
|
|
|
|
OK, so you bought this copyrighted program and you loaded it into
|
|
RAM or onto a hard disk without the FBI knocking on your door. Now can
|
|
you make a backup copy? YES. The Software Act also provided that you
|
|
can make a backup copy, provided that it "is for archival purposes only
|
|
...." What you cannot do, however, is give the archive copy to your
|
|
friend so that you and your pal both got the program for the price of
|
|
one. That violates the copyright owner's exclusive right to distribute
|
|
copies to the public. Get it? You can, on the other hand, give both
|
|
your original and backup to your friend -- or sell it to him, or lend it
|
|
to him, as long as you don't retain a copy of the program you are
|
|
selling. Although the copyright owner has the exclusive right to
|
|
distribute (sell) copies of the program, that right only applies to the
|
|
first sale of any particular copy. By analogy, if you buy a copyrighted
|
|
book, you are free to sell your book to a friend. The copyright owner
|
|
does not have the right to control resales.
|
|
|
|
1.7. Licenses may change the rules
|
|
|
|
At this point, let me remind you that we have assumed that the
|
|
program you got at the store was sold to you, not licensed to you.
|
|
Licenses may change the rules.
|
|
|
|
1.8. Can you modify the program?
|
|
|
|
Now, you're a clever programmer, and you know the program could run
|
|
faster with some modifications. You could also add graphics and an
|
|
interactive mode and lots of other stuff. What does copyright law say
|
|
about your plans? Well ... several different things, actually. First,
|
|
recall that the copyright owner has the exclusive right to make
|
|
derivative works. A derivative work is a work based on one or more
|
|
preexisting works. It's easy to recognize derivative works when you
|
|
think about music or books. If a book is copyrighted, derivative works
|
|
could include a screenplay, an abridged edition, or a translation into
|
|
another language. Derivative works of songs might be new arrangements
|
|
(like the jazz version of Love Potion Number 9), a movie soundtrack, or
|
|
a written transcription, or a long version, (such as the fifteen minute
|
|
version of "Wipe Out" with an extended drum solo for dance parties). In
|
|
my opinion, you are making a derivative work when you take the
|
|
store-bought word processor and modify it to perform differently. The
|
|
same would be true if you translated a COBOL program into BASIC. Those
|
|
are copyright infringements -- you've horned in on the copyright owner's
|
|
exclusive right to make derivative works. There is, however, some
|
|
breathing room. The Software Act generously allows you to adapt the
|
|
code if the adaptation "is created as an essential step in the
|
|
utilization of the computer program in conjunction with a machine ...."
|
|
For example, you might have to modify the code to make it compatible
|
|
with your machine.
|
|
|
|
1.9. Can you break the copy protection scheme?
|
|
|
|
Moving right along, let's assume your store bought program is copy
|
|
protected, and you'd really like to make a backup copy. You know this
|
|
nine-year-old whiz who can crack any copy- protection scheme faster than
|
|
you can rearrange a Rubix cube. Is there a copyright violation if he
|
|
succeeds? There's room to argue here. When you try to figure out if
|
|
something is an infringement, ask yourself, what exclusive right am I
|
|
violating? In this case, not the right to make copies, and not the right
|
|
to distribute copies. Public performance and display have no relevance.
|
|
So the key question is whether you are making a derivative work. My
|
|
answer to that question is, "I doubt it." On the other hand, I also
|
|
doubt that breaking the protection scheme was "an essential step" in
|
|
using the program in conjunction with a machine. It might be a "fair
|
|
use," but that will have to wait for another article. Anyone interested
|
|
in stretching the limits of the "fair use" defense should read the Sony
|
|
Betamax case.
|
|
|
|
1.10. Summary
|
|
|
|
Let me summarize. Copyright means the copyright owner has the
|
|
exclusive right to do certain things. Copyright infringement means you
|
|
did one of those exclusive things (unless you did it within the limits
|
|
of the Software Act, i.e., as an essential step ....).
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
PC-MENU MASTER: Hard Drive Menu System
|
|
by Radio Active
|
|
|
|
Found on local systems under the name: PCMENU11.ZIP ...71,002
|
|
|
|
System requirements:
|
|
None mentioned
|
|
|
|
Features:
|
|
Execute 80 DOS commands, (any DOS command!)
|
|
and/or .EXE, .COM, .BAT programs from one menu window
|
|
Easy to set up and use
|
|
Power and convenience of a large program without large memory
|
|
requirements
|
|
|
|
*Registered version includes:
|
|
Three levels password security
|
|
Compress data set for efficiency and space utilization
|
|
Control of PC-Menu Master banner page and trailing banner page
|
|
Printed documentation
|
|
Technical support
|
|
Update notices
|
|
|
|
PCMENU is one of the better hard drive menu programs I have looked
|
|
at for the novice computer user. The author mentions in his
|
|
documentation that it is especially useful for someone whose wife or
|
|
kids may not be too familiar with running programs. I think this is an
|
|
excellent point for this menu program.
|
|
|
|
It doesn't take much technical ability to set it up and once it is,
|
|
all there is to running 80 different commands or programs is just
|
|
highlighting your choice with a highlight bar and pressing enter twice
|
|
(once for your choice and again to confirm that you want to execute the
|
|
command). There are two main files, the one memory resident file is
|
|
very small and the other one drops out of memory when you run any
|
|
command or program. And when I said you could run 80 commands from the
|
|
menu, I didn't mean to limit it to that because you can have more than
|
|
one of these 80 command windows to work from. This makes this program a
|
|
very powerful menu program as well as a very friendly one! The shareware
|
|
version 1.10 that I looked at didn't have the password option enabled,
|
|
but for a small registration fee that and some other nice extras like a
|
|
printed manual can be had.
|
|
|
|
The commands you're limited to when configuring the menu can be any
|
|
DOS command, BATch files, EXEcute files, or COMmand files, I think
|
|
"limited" is the wrong word here! Also for every command name on the
|
|
menu (80 per menu) you can list up to twelve commands to be processed.
|
|
|
|
I.E.: 1. CD\GAMES
|
|
2. LIST CARDS.DOC
|
|
3. 5_CARD .....
|
|
4. (etc. up to 12)
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
WWIV: Part 2 of 3
|
|
By: Duck the Everpresent
|
|
Co-Sysop: The Cathouse
|
|
|
|
In my last article, I went over some of the basic functions of the
|
|
WWIV bulletin board software. Hopefully this helped some people to
|
|
better understand some of the operations of a WWIV system and how to go
|
|
about logging onto one. This time I will explain the transfer section,
|
|
as well as a few of the modifications that can be made to the software.
|
|
|
|
The most important part of a BBS, (besides the message bases) is
|
|
the transfer section. The transfer section is a way to exchange software
|
|
of interest and to contribute to a boards assets. The WWIV transfer
|
|
section is set up in an easy-to-use format that almost anyone, even the
|
|
telecommunications novice, can master in a few minutes.
|
|
|
|
Uploading to a WWIV system is a very easy task. You press "U", name
|
|
your file, give a one line description, then pick your transfer
|
|
protocol. There are many protocols, and any that aren't on a system
|
|
already can be installed. The letter "Z" will upload the file to the
|
|
sysop, but on some systems this is done anyway for verification
|
|
purposes. Downloading is accomplished in similar fashion; you press "D",
|
|
type the name (or a partial name, an asterisk, then an extension or
|
|
asterisk (i.e.: CONQ*.*)) and pick your protocol. If you use the same
|
|
protocol every time , then pressing return when it asks for the protocol
|
|
will pick the defaulted one . Batch downloads are available with the
|
|
letter "X".
|
|
|
|
Listing the files available for download is as easy as pressing
|
|
"L". It will then prompt you with a 'File Mask: ', to which you can
|
|
assign a certain letter, word, or extension to search for. For example,
|
|
typing *.ZIP will search for all files of the zip extension and list
|
|
them for that section. If you want to scan all sections then type "S"
|
|
and follow the same procedure for default. If a file is offline, it will
|
|
be followed by <ASK> on version 4.10 or lower or <N/A> on 4.11. Changing
|
|
sections is accomplished by pressing the appropriate number at the
|
|
transfer main prompt, and a listing of sections can be seen by typing an
|
|
asterisk at the main prompt. Pressing the "+" or "-" keys will also go
|
|
up or down a section respectively. If you wish to search all directories
|
|
for new files, pressing "N" will do the job.
|
|
|
|
There is also a way of viewing what is in an ARCed or ZIPed file
|
|
pressing "A", extracting the files you want and placing them in a
|
|
temporary file for download, the letter "E", and shuffling these files
|
|
around with various other commands attained by the letter "G".
|
|
|
|
The WWIV BBS is a very expandable system, whether you know how to
|
|
program or not. Such feature include ANSI menus, quote/ joke events, and
|
|
user best/ worst stats. The ability to expand is almost endless,
|
|
especially if you have the source code (obtained by registration) and a
|
|
working knowledge of the C programming language.
|
|
|
|
Well, that's about it for this article. My next article will
|
|
explore the different kind of online games available for WWIV's and a
|
|
word about networking. Till next time, Hasta.....
|
|
|
|
|
|
WWIV Bulletin Board System is Copyright Wayne Bell 1987, 1990
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
ProFile
|
|
by Chris Mohney
|
|
|
|
The ProFile is a short, half-serious biographical sketch given to
|
|
various computer telecommunications personalities around Birmingham.
|
|
Victims are selected randomly from a group of names put into the
|
|
notorious Hat. Anyone who thinks himself brave or witty enough may
|
|
petition for admittance to the Hat by leaving E-Mail to me (Chris
|
|
Mohney, most boards around town) to that effect. Anyone who wishes to
|
|
suggest more questions or sneakily nominate someone without their
|
|
knowledge may take the same route....
|
|
|
|
---------
|
|
|
|
Pro File on RICHARD FOSHEE
|
|
|
|
---------
|
|
|
|
Age: 22
|
|
|
|
Birthplace: Birmingham, AL.
|
|
|
|
Occupation: Surviving childhood
|
|
|
|
My hobbies include: Computers, Music, Dancing, Dating, Sex.
|
|
|
|
Years telecomputing: 7
|
|
|
|
Sysop, past/present/future of: Amiga Alliance
|
|
|
|
My oddest habit is: I like to get (CENSORED), and suck (CENSORED)
|
|
|
|
My greatest unfulfilled ambition is: To get a picture of Kelly Rosato
|
|
hitting on a drag queen.
|
|
|
|
The single accomplishment of which I am most proud is:
|
|
Getting Kelly Rosato into a gay bar on the night of the male
|
|
strippers.
|
|
|
|
My favorite performers are: Laura Hunter, The Weather Girls, Cher,
|
|
Paula Abdul
|
|
|
|
The last good movie I saw was: The Little Mermaid
|
|
|
|
The last good book I read was: Where the Red Fern Grows
|
|
|
|
If they were making a movie of my life, I'd like to see my part played by:
|
|
Jeff Stryker
|
|
|
|
My pet peeves are: Someone saying "I'll respect you in the morning"
|
|
when they don't even respect you now.
|
|
|
|
When nobody's looking, I like to: Bite my toenails
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
PC Board 14.5 (beta) New and Enhanced Commands
|
|
by David Terry (Clarke Development)
|
|
|
|
this article has been edited to fit our space and we hope you
|
|
find it useful. MM
|
|
|
|
B)ulletin
|
|
added: A = All, display all bulletins
|
|
added: N = New, display all new bulletins
|
|
added: S = Scan, allows AND/OR searches and then displays the
|
|
entire bulletin if the text was found anywhere in it
|
|
added: D = Download, queues up all requested bulletins for
|
|
downloading (whether explicitly requested or requested
|
|
via the All, New or Scan subfunctions)
|
|
|
|
D)ownload
|
|
enhanced: Batch downloads now accept wildcards
|
|
added: Ymodem and Ymodem/G as internal BATCH protocols
|
|
enhanced: During shelled protocols the top 3 lines are frozen
|
|
enhanced: Prior to initiating the file transfer you can edit the
|
|
list of files batched up for file transfer - adding or
|
|
removing files from the list.
|
|
|
|
E)nter Message
|
|
added: Full Screen Editor
|
|
added: F = return to Full Screen Editor
|
|
added: Q = quote mode
|
|
added: U = upload mode (non-echo mode)
|
|
enhanced: Saves the message "as is" if carrier is lost prior to
|
|
the user saving the message (the message can later be
|
|
re-edited using the new EDIT command described below)
|
|
|
|
E)dit Header (subfunction of read command)
|
|
added: N = Refer Number
|
|
added: R = Read Status
|
|
added: P = Protection (including Sender and Group Password)
|
|
|
|
EDIT) Msg (subfunction of read command)
|
|
new cmd: Allows the originator of a message to re-edit his
|
|
message after having posted it.
|
|
|
|
F)iles
|
|
enhanced: Optionally will colorize DIR files on the fly (applies
|
|
to the "L", "N" and "Z" commands as well)
|
|
enhanced: V)iew now passes the comm port number to the batch file
|
|
added: G = Goodbye
|
|
|
|
FLAG) File main prompt, subfunction of Files prompt or more prompt
|
|
new cmd: Allows the caller to "flag" a file for later download.
|
|
Any number of files may be flagged up to the batch file
|
|
limit set by the sysop.
|
|
|
|
J)oin
|
|
enhanced: Now accepts either a conference number or a name
|
|
|
|
L)ocate
|
|
enhanced: Displays all secondary lines after the matched filename
|
|
enhanced: If an invalid file is requested it will automatically
|
|
switch to a Z)ippy search command
|
|
enhanced: If the filename is less than 8 characters long and no
|
|
wildcards have been used it automatically appends "*.*"
|
|
to the name (ie searching for BETA turns into BETA*.*).
|
|
enhanced: Changes a request of "FILE*" to "FILE*.*"
|
|
added: D = Download, download files that are found
|
|
added: N = New, locate files using filespec and date
|
|
|
|
N)ew
|
|
enhanced: displays all secondary lines after the file is found
|
|
added: D = Download, download files that are found
|
|
|
|
O)p Page
|
|
enhanced: When done the caller's screen is restored and the
|
|
session continues from where he left off
|
|
|
|
OPEN a DOOR
|
|
enhanced: Now accepts either a door number or a door name
|
|
|
|
Q)uick Scan
|
|
enhanced: TS (see TS enhancements in the Read command)
|
|
|
|
R)ead command
|
|
enhanced: TS = now scans the message text as well as the header
|
|
enhanced: TS = if in graphics mode it highlights the text
|
|
enhanced: TS = allows AND/OR searches to be performed
|
|
enhanced: TS = allows stacking of search text and msg number
|
|
added: COPY = COPY a message (similar to MOVE a message)
|
|
added: RR = read the reference message
|
|
added: L = read in reverse order from the last message back
|
|
added: Z = zip (compress) capture file before downloading
|
|
added: SET = set last message read pointer
|
|
added: G = Goodbye
|
|
added: J = Join a conference
|
|
added: USER = Read mail either to or from a specific user
|
|
added: O = Read Only - it doesn't set Last Msg Read pointer
|
|
it doesn't mark a message as being read. It can
|
|
be restricted by security level.
|
|
|
|
SELECT
|
|
new cmd: Can be used to select or deselect conferences the user
|
|
wants to scan and also to reset the last message read.
|
|
|
|
TEST
|
|
new cmd: Can be used to test a file for CRC errors or viruses
|
|
prior to downloading (if the sysop provides the test).
|
|
|
|
U)pload
|
|
added: Ymodem and Ymodem/G as internal BATCH protocols
|
|
enhanced: Allows external batch uploads using DSZ-log compatible
|
|
protocols
|
|
enhanced: Allows user supplied multi-line descriptions with word
|
|
wrapping while typing in the descriptions
|
|
enhanced: Records the name of the uploader in the description
|
|
|
|
WHO command
|
|
new cmd: Allows a caller to view the list of callers currently
|
|
online - WITHOUT giving them access to the node chat
|
|
functions (can be useful if you want the caller to know
|
|
who is there but don't want them tieing up the system
|
|
chatting with other callers while online).
|
|
|
|
Y)our Mail Scan
|
|
added: Q = Quick Scan for your mail. It displays only the
|
|
number of messages found and the number that are
|
|
for you using 1 line per conference instead of the
|
|
normal 3 line display.
|
|
|
|
Z)ippy Search
|
|
enhanced: Displays all secondary lines as well as filename
|
|
enhanced: If in graphics mode it highlights the "found" text
|
|
enhanced: Allows AND/OR searches to be performed and will even
|
|
find matches if keywords are on SEPARATE lines in the
|
|
DIR file
|
|
added: D = Download, download files that are found
|
|
added: N = New, locate files using filespec and date
|
|
|
|
USERS command
|
|
new cmd: Allows caller to see the names of users in a conference
|
|
and to search the user names/cities for any text
|
|
|
|
|
|
Enhanced:
|
|
* At logon it now displays the bulletin numbers of updated bulletins.
|
|
|
|
* PCBoard now uses an "auto ansi detection" routine so that if a user
|
|
chooses not to use color graphics but his comm program has ansi
|
|
capabilities PCBoard will take advantage of them (for faster cursor
|
|
movement, defaulting to the full screen editor, etc).
|
|
|
|
* PCBoard now displays an asterisk "*" to the right of the FILE DATE
|
|
when displaying file listings to indicate that the file is new to
|
|
you i.e. the file is more recent than your "Date of Last DIR Scan".
|
|
|
|
* PCBoard now removes the vertical bar "|" from the display when
|
|
secondary file descriptions are found.
|
|
|
|
* PCBoard now only updates the user's "Last Date DIR Scanned" to match
|
|
the date of the most recent file posted rather than using the date
|
|
on which he performed the scan.
|
|
|
|
* All multi-letter commands (COPY, MOVE, LANG, OPEN, NODE, etc) can
|
|
now be called by typing just the first two letters.
|
|
|
|
* For a "R A c/d/z" command (capture,download,zip) you can now set the
|
|
maximum number of messages by area and total for the scan so that
|
|
the caller does not overrun your hard disk on a capture.
|
|
|
|
* The status lines include not only the logon time and current time
|
|
but also the current minutes online and minutes remaining.
|
|
|
|
* Searching for files (for downloading) now begins with the default
|
|
filename extension if no extension was provided by the caller - in
|
|
other words if the caller asks for TEST it will first search for a
|
|
file called TEST.ZIP and not finding one will then search for TEST.
|
|
|
|
* When reading messages the caller can have the screen cleared prior
|
|
to displaying a message - this can be set with W)rite User Info.
|
|
|
|
* Input fields which are surrounded by parenthesis (i.e. having the
|
|
"(" and ")" characters around the field) can be edited using the
|
|
cursor keys or the CTRL-Key substitutes that are used by the Full
|
|
Screen Editor.
|
|
|
|
* PCBSetup now differentiates between "editing your own message" and
|
|
"editing any message" for security purposes.
|
|
|
|
* Door applications can now be executed without having to type OPEN
|
|
or DOOR and a number. Plus they can now be given command line
|
|
parameters at the time of opening.
|
|
|
|
* PCBoard now records (in the user's record) when a message is left
|
|
for him via PCBoard so that when he logs on he will be informed of
|
|
the fact that there is mail waiting for him AND which conferences
|
|
have mail waiting without having to scan for new mail.
|
|
|
|
* Replying to a message that is FROM yourself will now result in the
|
|
TO field being copied over to the TO field of the reply rather than
|
|
copying the FROM field across.
|
|
|
|
* Replying to a NON-echo message will now default to NO when asked if
|
|
the message should be echoed.
|
|
|
|
* Added support for FREE files - where files can be downloaded and not
|
|
be charged in the files or bytes downloaded record as well as not
|
|
charging against the time online if desired.
|
|
|
|
* The sysop can now set in PCBSetup the hours when he is 'in' for
|
|
answering the page bell.
|
|
|
|
* The name of the message CAPTURE file can now be set in PCBSetup or
|
|
when not specified it defaults back to the caller number.
|
|
|
|
* The CAPTURE file when downloaded can now be set to not charge the
|
|
download time against his session time.
|
|
|
|
------------------------------------------------------------------------
|
|
(example usage of some of the new commands):
|
|
|
|
* TS A 1+ <enter>
|
|
PCBoard & LANtastic <enter>
|
|
|
|
The above commands will search thru every available message in ALL
|
|
conferences areas you are set to scan for any message that has both
|
|
the word "PCBoard" AND the word "LANtastic" in it.
|
|
|
|
* TS A 1+ <enter>
|
|
PCBoard & (LANtastic | DESQview) <enter>
|
|
|
|
The above commands will search thru every available message in ALL
|
|
conferences areas you are set to scan for any message that has both
|
|
the word "PCBoard" AND either the word "LANtastic" OR the word
|
|
"DESQview" in it.
|
|
|
|
The parenthesis tell PCBoard how you want to group your criteria if
|
|
you have a complex search request such as the one above. It will
|
|
allow for nearly any number of parens and any combination of AND's
|
|
(using the "&" character) and OR's (using the "|" character).
|
|
|
|
* TS A 1+ USER JOHN DOE <enter>
|
|
PCBoard & Help <enter>
|
|
|
|
The above command (similar to examples above) adds the keyword USER
|
|
to the command line specifying that only messages that are either
|
|
TO or FROM John Doe should be displayed if they are found to have
|
|
both the words PCBoard and Help in them.
|
|
|
|
* Z A <enter>
|
|
PCBoard & DESQview <enter>
|
|
|
|
The above commands will search all of the file directories for any
|
|
file that has both the word "PCBoard" and the word "DESQview" in the
|
|
description (anywhere - including secondary description lines).
|
|
|
|
* L PCB*.* A N <enter>
|
|
120189 <enter>
|
|
|
|
The above command combines a Locate Search of the file directories
|
|
with a "new files search" for files that begin with "PCB" and were
|
|
posted on or after 12/01/89.
|
|
|
|
* Z DESQview A S D <enter>
|
|
|
|
The above command combines the Zippy Search of the file directories
|
|
with a "new files since" search and then tags all files found for
|
|
later downloading (i.e. files with "DESQview" in the description
|
|
that are new since the last time you were on)
|
|
|
|
* USERS <enter>
|
|
Utah <enter>
|
|
|
|
The above command searches for the names of users that participate
|
|
in the current conference who have the word "Utah" in their user
|
|
record (USERS does a text search on the name and address fields).
|
|
|
|
* 7 S <enter>
|
|
John & (Smith | Doe) <enter>
|
|
|
|
The above command (sysop function 7) will search the entire user
|
|
record (name,address,phone,comments,etc) for the any user record
|
|
that has both the word "JOHN" and either the word "SMITH" or the
|
|
word "DOE" in it.
|
|
|
|
* OPEN QMAIL <enter>
|
|
|
|
The above command will search and find the QMAIL door and open it
|
|
(rather than having to know the number of the door).
|
|
|
|
* J SUPPORT <enter>
|
|
|
|
The above command will search and join the SUPPORT conference
|
|
(rather than having to know the number of the conference).
|
|
|
|
* B A <enter>
|
|
|
|
The above command will display all bulletins.
|
|
|
|
* B N D <enter>
|
|
|
|
The above command will download all new bulletins.
|
|
|
|
* B A S D <enter>
|
|
DESQview & LANtastic
|
|
|
|
The above command will download all bulletins that have both the
|
|
word "DESQview" and the word "LANtastic" somewhere in the file.
|
|
|
|
* R A Z <enter>
|
|
|
|
The above command will capture all messages in all conferences since
|
|
the last message read, compress the capture file and the begin the
|
|
download procedure.
|
|
|
|
* 13 A S <enter>
|
|
JOHN DOE | JOHN SMITH <enter>
|
|
|
|
Searches all caller logs and displays entries where either John Doe
|
|
or John Smith were logged on.
|
|
|
|
* R SET 100 <enter>
|
|
|
|
Sets the last message read for that conference to 100.
|
|
|
|
* Y A S Q <enter>
|
|
|
|
The "Q" which is a new parameters gives a new display showing each
|
|
conference on a single line and shows only the number of messages
|
|
for you and the number found. It looks something like this:
|
|
|
|
Messages Messages
|
|
Num Conference To You Found
|
|
--- ---------- -------- --------
|
|
0 Main Board 0 18
|
|
1 Support 12 1628
|
|
2 DOOR 5 370
|
|
3 Utility 0 431
|
|
4 Net_Mail 1 895
|
|
5 LANtasti 2 642
|
|
|
|
* SELECT D 1-3 6 <enter>
|
|
|
|
The select command is used to select or deselect conferences. The
|
|
above command starts out by deselecting all conferences after which
|
|
it reselect conferences 1 thru 3 followed by 6. It will then prompt
|
|
the caller for any last message read changes in each of the newly
|
|
selected conferences.
|
|
|
|
* OPEN 1
|
|
* OPEN MYDOOR
|
|
* OPEN 1 PARAMETERS TO MYDOOR
|
|
* OPEN MYDOOR PARAMETERS TO MYDOOR
|
|
* MYDOOR
|
|
* MYDOOR PARAMETERS TO MYDOOR
|
|
|
|
All of the above are now valid ways of opening a door. In these
|
|
examples the door name is "MYDOOR" and it can be opened either with
|
|
or without the words OPEN or DOOR. Additionally, parameters may be
|
|
typed in on the command line which will then be sent to the door
|
|
application on the assumption that it can use the parameters.
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
Known BBS Numbers For The Birmingham Area
|
|
|
|
NAME NUMBER BAUD RATES SUPPORTED MODEM TYPE
|
|
|
|
*Alter-Ego BBS 925-0707 300, 1200, 2400
|
|
*American BBS 674-1851 300, 1200, 2400
|
|
*Bus System BBS 595-1627 300, 1200, 2400
|
|
#*Byte Me 979-2983 1200, 2400, 9600 HST
|
|
Camelot BBS 856-0679 300, 1200, 2400
|
|
^Cat House 854-5907 300, 1200, 2400, 9600 V.32
|
|
-*Channel 8250 Node 1 744-8546 300, 1200, 2400, 9600 HST, V.32
|
|
-*Channel 8250 Node 2 744-5166 300, 1200, 2400, 9600 HST
|
|
*Crow's Nest 951-5678 300, 1200, 2400
|
|
*Crunchy Frog 956-1755 300, 1200, 2400
|
|
D3 Systems BBS 663-2759 300, 1200, 2400, 9600 HST, V.32
|
|
+Duck Pond BBS 822-0956 300, 1200, 2400, 9600 HST, V.32
|
|
^*Eazy's Playhouse 870-0434 1200, 2400 MNP4
|
|
Elite Fleet 853-1257 300, 1200, 2400
|
|
Emerald Castle 871-6510 300, 1200, 2400
|
|
EzNet Central 785-7417 1200, 2400, 9600 HST
|
|
Hacker's Corner 674-5449 300. 1200, 2400
|
|
+I.S.A. BBS 995-6590 300, 1200, 2400, 9600 HST
|
|
*Joker's Castle 744-6120 300, 1200, 2400
|
|
^*Lands Of Brittania 791-0421 1200, 2400
|
|
*Little Kingdom Node 1 823-9175 300, 1200, 2400, 9600 HST, V.32
|
|
*Little Kingdom Node 2 823-9192 300, 1200, 2400 MNP4
|
|
LZ Birmingham 870-7770 300, 1200, 2400
|
|
*Magnolia BBS 854-6407 300, 1200, 2400, 9600 HST
|
|
Posys BBS 854-5131 300, 1200, 2400
|
|
*Radio Free Troad 592-6234 300, 1200, 2400, 9600 HST
|
|
Role Player's Paradise 631-7654 300, 1200, 2400
|
|
Safe Harbor 665-4355 300, 1200, 2400
|
|
Sandwich Shop 226-1872 300, 1200, 2400
|
|
Shadetree BBS 787-6723 300, 1200, 2400
|
|
Sperry BBS 853-6144 300, 1200, 2400, 9600 Hayes
|
|
*ST BBS 836-9311 300, 1200, 2400
|
|
The Commodore Zone 856-3783 300, 1200, 2400
|
|
The Connection 854-9074 1200, 2400
|
|
The Islands BBS 870-7776 300, 1200, 2400
|
|
The Kingdom Of Teletech 674-0852 300, 1200, 2400
|
|
-The Matrix Nodes 1-4 323-2016 300, 1200, 2400
|
|
-The Matrix Node 5 251-2344 300, 1200, 2400, 9600 HST
|
|
VCM(ee) BBS Node 1 655-4059 300, 1200, 2400
|
|
VCM(ee) BBS Node 2 655-4065 300, 1200
|
|
Victory Express 425-0731 300, 1200
|
|
Willie's DYM Node 1 979-1629 300, 1200, 2400
|
|
Willie's DYM Node 2 979-7739 300, 1200, 2400
|
|
Willie's RBBS 979-7743 300, 1200, 2400
|
|
Ziggy Unaxess 991-5696 300, 1200
|
|
|
|
Boards with a "*" before their name are members of our local network,
|
|
EzNet, and public messages left in the EzNet Conferences of any of these
|
|
boards will be echoed to all members.
|
|
|
|
Boards with a "+" before their name are members of FidoNet, an
|
|
international network that provides a variety of public forums as well
|
|
as private mail services all over the world.
|
|
|
|
Boards with a "#" before their name are members of our local WWIV
|
|
network, and public messages left in any of the netowrk conferences
|
|
will be echoed to all members.
|
|
|
|
Boards with a "-" before their name are members of MetroNet, an
|
|
international network that provides a variety of public forums as well
|
|
as private mail services all over the world.
|
|
|
|
Boards with a "^" before their name are members of WWIV-Net, an
|
|
international network that provides a variety of public forums as well
|
|
as private mail services all over the world.
|
|
|
|
If you have any corrections, additions, deletions, etc., please let us
|
|
know via EzNet.
|
|
|
|
-----------------------------------------------------------------------
|
|
|
|
EzNet Multiple Echo List
|
|
|
|
EzNet now supports multiple conference echoing but there are a few
|
|
things you should be aware of regarding private mail.
|
|
|
|
A. You have one 'address' for private mail. If you are registered for
|
|
private mail on Channel 8250 and someone sends you a private
|
|
message in the MS-DOS conference from Crunchy Frog it will wind
|
|
up in the Hardware conference on Channel 8250 as it should.
|
|
|
|
However, if you were registered for private mail on Magnolia and
|
|
someone sends you a private message in a conference that Magnolia
|
|
does not support (echo) then the message will wind up in the
|
|
twilight zone.
|
|
|
|
B. If you go by a handle on one BBS and your real name on another even
|
|
if the private message goes where it is supposed to, you will not
|
|
be able to read it because it is addressed to someone else as far
|
|
as PC Board is concerned. PC Board has no way of knowing that Red
|
|
Foxx and John Doe are the same person. No tickee, no washee.
|
|
|
|
Advice on sending private mail: If you don't know if the person you
|
|
are sending private mail to is registered for private mail then keep a
|
|
copy of the message in case you have to find an alternate route. EzNet
|
|
Central will delete your private, undelivered message and inform you
|
|
that the user you attempted to reach is not registered for private mail
|
|
on any EzNet Node.
|
|
|
|
This is a list of the current echoes that I am aware of. More are
|
|
in the making and will be posted in future issues. If you are a sysop
|
|
and are running an echo not listed for your board, please make us aware
|
|
of it so we may correct it next issue.
|
|
|
|
|
|
Eznet Program IBM Adult Scitech BTNWA
|
|
|
|
Alter-Ego ........... * ..... ..... ..... ..... ..... ..
|
|
American BBS ........ * ..... ..... ..... ..... ..... ..
|
|
Bus System BBS ...... * ..... * ..... * ..... ..... * ..... * ..
|
|
Byte Me ............. * ..... * ..... * ..... * ..... ..... ..
|
|
Channel 8250 ........ * ..... * ..... * ..... ..... * ..... ..
|
|
Crow's Nest ......... * ..... ..... ..... ..... ..... ..
|
|
Crunchy Frog ........ * ..... ..... * ..... * ..... ..... * ..
|
|
Eazy's Playhouse .... * ..... * ..... * ..... * ..... ..... ..
|
|
Joker's Castle ...... * ..... ..... ..... * ..... ..... ..
|
|
Lands Of Brittania .. * ..... * ..... * ..... ..... ..... ..
|
|
Little Kingdom ...... * ..... * ..... * ..... * ..... * ..... ..
|
|
Magnolia BBS ........ * ..... ..... ..... ..... ..... ..
|
|
Radio Free Troad .... * ..... ..... ..... ..... ..... ..
|
|
ST BBS .............. * ..... ..... ..... * ..... ..... ..
|