Copy Link
Add to Bookmark
Report
Birmingham Telecommunications News 021
BTN: Birmingham Telecommunications News
COPYRIGHT 1990
January 1990 Volume 3, Issue 1
Table Of Contents
-----------------
Article Title Author
Policy Statement and Disclaimer................Staff
Editorial Column...............................Idiot-In-Chief
Atta Boy & Then Some...........................Mark Maisel
A FidoNet Tutorial.............................Larry Odom
Berlin Wall Interview..........................Karsten Propper
Review & Overview of ProDoor 3.1...............Ricky Morgan
Profile: Randy Hilliard.......................Chris Mohney
Amiga On The Loose.............................Richard Foshee
Is There A Dark Contagion......................Percy Peabody
Insights: A Modest Proposal...................Ron Albright
A Look Into The Twilight Zone..................Richard Kushner
Book Review....................................Karsten Propper
Message Board..................................Barry Bowden
Known BBS Numbers..............................Staff
EzNet Multiple Echo List.......................Staff
-----------------------------------------------------------------------
Disclaimer and Statement of Policy for BTN
We at BTN try our best to assure the accuracy of articles and
information in our publication. We assume no responsibility for
damage due to errors, omissions, etc. The liability,if any for BTN, its
editors and writers, for damages relating to any errors or omissions,
etc., shall be limited to the cost of a one year subscription to BTN,
even if BTN, its editors or writers have been advised of the likelihood
of such damages occurring.
With the conclusion of that nasty business, we can get on with our
policy for publication and reproduction of BTN articles. We publish
monthly with a deadline of the fifteenth of the month prior to
publication. If you wish to submit an article, you may do so at any
time but bear in mind the deadline if you wish for your work to appear
in a particular issue. It is not our purpose to slander or otherwise
harm a person or reputation and we accept no responsibility for the
content of the articles prepared by our writers. Our writers own their
work and it is protected by copyright. We allow reprinting of articles
from BTN with only a few restrictions. The author may object to a
reprint, in which case he will specify in the content of his article.
Otherwise, please feel free to reproduce any article from BTN as long as
the source, BTN, is specified, and as long as the author's name and the
article's original title are retained. If you use one of our articles,
please forward a copy of your publication to:
Mark Maisel
Editor, BTN
221 Chestnut St.
BHM, AL 35210-3219
We thank you for taking the time to read our offering and we hope that
you like it. We also reserve the right to have a good time while doing
all of this and not get too serious about it.
-----------------------------------------------------------------------
Editorial
by Mark Maisel
Welcome to the new year and I hope that one of your resolutions
will be to religiously read BTN each month and that when quizzed, you
wil be able to answer any question put to you regarding any issue. Even
if you don't read every issue, you ought to read this one. It is even
bigger than the Christmas issue which left me absolutely amazed. Since
editors world wide are using their columns this month to act as pundits
for the coming decade or to say goodbye to the past one, I will do what
you expect and completely forget that business. I have absolutely
nothing to say in the way of any predictions or "I told ya so's" this
time. No, not me. I won't even mention the time that I told Randy...
but I digress. This issue has a great variety of articles to choose
from though I recommend reading all of them.
We start with my report on some very odd behavior on the part of
Tom Egan. To say any more would spoil the surprise. Larry Odom, sysop
of I.S.A. BBS, expands on a previous article by Howard Duck, sysop of
Duck Pond, on FidoNet. He also provides new information for anyone who
is interested in becoming a member of this network. If you have ever
wondered how FidoNet manages to connect over 5000 bulletin boards
together with mail and file service, now is your chance to find out.
Events in Eastern Europe have been in the news for the last few months,
particularly the dismantling of the Berlin Wall. Karsten Propper,
wanting to hear a personal perspective from an affected German,
interviewed his father on this event. Mr. Propper shares his feelings
with us and helps provide better understanding of the feelings of many
Germans on this issue. Ricky Morgan follows with the continuation of
his series on ProDoor 3.1 and devotes this month to file transfer
options. Don't miss it if you want to experience the great flexibility
ProDoor offers in this area. Guess whose name got pulled this month:
Randy Hilliard. Chris swears that it was a random pull from the hat and
Randy does his best to answer the ProFile questions. Ole Randy told
Chris that he had not experienced such test anxiety since his last blood
test. Richard Foshee steps up to bat for the Amiga again, this time
expanding on an article by Kelly Rosato on multitasking. Richard
describes multitasking on the Amiga and explains some of the concepts
behind this ability. The next article, written by Percy Peabody, deals
with the darker side of telecommunications. He expands on and shares
his feelings about an article detailing the use of bulletin boards by
violent and racist groups that appeared in a recent issue of PC
Computing. Ron Albright offers us all a modest proposal for bringing
computer literacy to our children that bears your attention,
particularly if you own more than one computer. Thanks to the wandering
eyes of Dean Costello, we have a re-print from ST Report by Richard
Kushner that is a not quite so fictional as he would have you believe
story about the computer wars of the early 1980's. Karsten Propper
reviews another book for us in the science fiction genre so take a look
and see if he knows what he is talking about. We close the issue, at
last, with our regulars, Message Board, The Known BBS List, and the
EzNet Echo List.
I hope that you will enjoy this issue. Please leave public comments on
EzNet. To the many contributors, thanks once again!
-----------------------------------------------------------------------
Atta Boy & Then Some
by Mark Maisel
It was recently brought to my attention that our resident "Evil
Nazi", Tom Egan, Remote Sysop of The Matrix, has been behaving in ways
that are sure to get him booted from "The Bad Guys In America" listing.
I don't really know how to tell you folks this but I assure you that it
is true.
While driving back to town from a job in Montgomery, Tom happened
upon a most unusual sight. As he approached an overpass, he saw a woman
fall, hit the highway next to the car in front of him, and bounce into
his path. He quickly managed to stop his car and proceeded to turn it
around to face the oncoming traffic. He parked his car about 1/4 mile
behind the woman with his headlights on to warn cars to get out of the
lane. He then rushed back to the woman to see what could be done for
her. As cars stopped to offer help, he asked them to call for emergency
aid and an ambulance. He then put his Red Cross emergency training to
work, I didn't believe it either, and went on to keep the woman
immobilized until help could arrive. Tom reasoned that the woman most
likely had some broken bones and possible spinal damage so he worked to
hold her still. He told me that the woman tried to get up so he had to
be very careful to keep her down yet not aggravate her injuries further.
In addition, he kept up a steady stream of talk to try and calm her and
keep her from going into shock.
After help arrived, Tom came back home and reported the days events
to his wife and to me. She and I were impressed to say the least. As
time passed, Tom was told by the people at the hopsital that the woman
broke both legs, one ankle, one arm, and also had sustained spinal
damage. Tom was also told that the woman would most likely experience
a complete recovery due to his efforts at immobilizing her. If not for
Tom, the woman probably have become paralyzed. One thing Tom never has
found out is why the woman fell from the overpass.
I felt that this story deserved to be shared with you all and that
it certainly demonstrates that there is some good in everyone, even an
"Evil Nazi" like our Tom. So next time he logs you off, messes up your
game, or message pointers, consider his heroics and let him have his
fun. You might also leave Tom an "Atta Boy" message next time you are
on The Matrix and let him know how proud you are of him.
Editor's Note: The woman has since been released from the hospital
and will recover fully.mm
-----------------------------------------------------------------------
A FidoNet Tutorial -
by Larry Odom
Sysop of ISA-BBS of Birmingham
Section
1 Overview
The Levels of FidoNet
Coordinators
Region 18 Coordinator and In-State Listing
2 Sysop Procedures
How to get a node number
3 Network Communications
Node list distribution
Newsletter distribution
Network mail distribution
Echomail Distribution and Symbolic Listing
Overview -
FidoNet is an amateur electronic mail system. As such, all of its
participants and operators are non-paid volunteers. From its early
beginnings as a few friends swapping messages back and forth, it has
now grown to (November 89) over 5000 different systems on four
continents.
FidoNet is large enough that it would quickly fall apart of its own
weight unless some sort of structure and control were imposed on it.
Multinet operation provides the structure. Decentralized management
provides the control.
The Levels of FidoNet -
FidoNet nodes are grouped on several levels. These are as follows:
o FidoNet; This indicates the entire public amateur mail network, as
administered by the International FidoNet Association, and as
defined by the weekly node list.
o Zones; A zone is a large geographic area containing many regions,
and covering one or more countries and/or continents.
o Regions; A region is a well defined geographic area containing
nodes which may or may not be combined into networks. A typical
region will contain many nodes in networks, and a few independent
nodes, which are not a part of any network.
o Networks; A network is a collection of nodes, usually in a
relatively small geographic area. Networks coordinate their mail
activity to decrease cost and increase mail throughput.
o Hubs; A hub is a subdivision of a network that assists in network
management by routing mail to, and by coordinating for, a
collection of nodes in that network. In general only the larger
networks will have hubs.
o Nodes; A node is a single FidoNet address, and is the smallest
recognized unit of FidoNet.
o Points; A point is a node on a private network which is accessible
through a node on FidoNet.
Each subdivision at each level is managed by a coordinator. A
coordinator is a person who coordinates the technical aspects of
network mail. This entails both administrative and technical tasks,
which will be described later. The following levels of coordinators
are currently recognized:
o The International Coordinator; The International Coordinator
compiles all of the node lists from all of the regions and creates
the master node list, which is then distributed over FidoNet.
o The Zone Coordinator; A Zone Coordinator maintains the list of
administrative nodes in his zone and accepts node lists from the
Regional Coordinators in his zone. He compiles these lists to
create a zone node list, which he then sends to the International
Coordinator for inclusion in the master node list. A Zone
Coordinator is also responsible for overseeing any zone gateways
in his zone.
o The Regional Coordinator; A Regional Coordinator maintains the
list of independent nodes in his region and accepts node lists
from the Network Coordinators in his region. He compiles these
lists to create a regional node list for his region, which he then
sends to his Zone Coordinator. A Regional Coordinator does not
perform routing services for any nodes in his region.
o The Network Coordinator; A Network Coordinator maintains the list
of any nodes in his network that are not served by a hub and
accepts node lists from the Hub Coordinators in his network. He
compiles these lists to create a network node list for his
network, which he then sends to his Regional Coordinator. A
Network Coordinator is also responsible for forwarding any mail
addressed to nodes in his network.
o The Hub Coordinator; A Hub Coordinator maintains the list of nodes
in his hub and sends it to his Network Coordinator. A Hub
Coordinator is also responsible for forwarding any mail addressed
to nodes in his hub.
o The Sysop; A Sysop formulates his own policy for running his board
and dealing with his users, so that will not be discussed in this
document. However, a Sysop must also mesh with the rest of the
FidoNet system if he is to send and receive mail, and that will be
discussed here.
These levels act to distribute the administration and control of
FidoNet to the lowest possible level, while still allowing for
coordinated action over the entire mail system. Administration is
made possible by operating in a strict top-down manner. That is, a
coordinator at any given level is responsible to the coordinator
immediately above him, and responsible for everyone below him.
For example, a Regional Coordinator is solely responsible to his Zone
Coordinator for anything that may or may not happen in his region.
From the point of view of the Zone Coordinator, the Regional
Coordinator is totally and completely responsible for the smooth
operation of his region. Likewise, from the point of view of the
Regional Coordinator, the Network Coordinators are totally and
completely responsible for the smooth operation of their networks.
If a coordinator at any level above sysop is unable for any reason to
properly perform his duties, he can be replaced by his coordinator at
the next level up. For example, if a Regional Coordinator is failing
to perform his duties, then his Zone Coordinator can appoint a new
Regional Coordinator to replace him.
The primary responsibility of any coordinator is technical management
of network operations. Management decisions should be made strictly
on technical grounds.
Region 18 Coordinator & In-State Host Listing -
Type Node Board's Name Phone Number City Baud
==== ==== ============ ============ ==== ====
REGION 18 SouthEast/Caribbean 1-919-274-5760 AL FL GA MS NC SC T 9600
HOST 373 Rocket City Net 1-205-880-7723 Huntsville AL 9600
HOST 375 Central Alabama Net 1-205-279-7313 Montgomery AL 9600
HOST 3602 BHAMnet 1-205-822-0956 Birmingham AL 9600
HOST 3607 North Alabama Net 1-205-355-2983 Decatur AL 9600
Sysop Procedures -
A sysop of an individual node can pretty much do as he pleases, as
long as he observes the mail events, is not excessively annoying to
other nodes on FidoNet, and does not promote the distribution of
pirated copyrighted software.
National Mail Hour is the heart of FidoNet, as this is when network
mail is passed between systems. Any system which wishes to be a part
of FidoNet must be able to receive mail at this time. A system which
is a member of a network may also be required to observe additional
mail events, as defined by his Network Coordinator.
Failure to observe the proper mail events is sufficient grounds for
any node to be dropped from FidoNet.
Network mail systems generally operate unattended and place calls at
odd hours of the night. If a system tries to call an incorrect or out
of date number, it could cause some poor citizen's phone to ring in
the wee hours of the morning, much to the annoyance of innocent
bystanders and civil authorities. For this reason, a sysop who sends
mail is obligated to obtain and use the most recent edition of the
node list as is practical.
The exact timing of National Mail Hour is set for each zone by the
Zone Coordinator. In the United States, National Mail Hour is
observed from 0900 to 1000 Greenwhich Mean Time (GMT) every day,
weekends included. In each of the United States time zones, this would
be as follows:
Eastern Standard Time 4 AM to 5 AM
Central Standard Time 3 AM to 4 AM
Mountain Standard Time 2 AM to 3 AM
Pacific Standard Time 1 AM to 2 AM
Hawaii Standard Time 11 PM to Midnight
FidoNet does not observe daylight savings time. In areas which
observe daylight savings time the FidoNet mail schedules must be
adjusted in the same direction as the clock change. Alternatively,
you can simply leave your system on standard time.
How to get a node number -
You must first obtain a current node list so that you can send mail.
You do not need a node number to send mail, but you must have one in
order for others to send mail to you.
The first step in obtaining a current node list is to locate a FidoNet
bulletin board.
If the sysop of any FidoNet system does not have a node list available
for downloading, then he can probably tell you where to get one.
Once you have a node list, you must determine which coordinator to
apply to. The coordinator of any network or region is always node
zero of that network or region. A Hub Coordinator will always be
indicated in the node list by a "HUB" prefix.
You should apply to the lowest-level coordinator that covers your
area. For example, if you are located within the hub of a network,
then you would apply to the Hub Coordinator. If there is no network
that covers your area, then you would apply to the Regional
Coordinator for your region.
Your application for a node number must be sent to the coordinator by
FidoNet mail, and must include at least the following:
1) Your name.
2) The name of your system.
3) The city and state where your system is located.
4) The phone number to be used when calling your system.
5) Your hours of operation.
6) The maximum baud rate you can support.
Your coordinator may want additional information. If so, he will
contact you. Please allow at least two to three weeks for a node
number request to be processed.
Node list distribution -
The node list is posted weekly on Saturday, along with a "difference
file" giving the changes for the week. It is your responsibility to
obtain the difference file from your coordinator every week and to
distribute it to the coordinators below you. The method of
distribution is left to your discretion. It is also desirable that
you make it available for downloading by the general user, but this is
not required.
Newsletter distribution -
The newsletter, called FidoNews, is published weekly on Monday and is
distributed as an archive named FNEWSvnn.ARC, where "v" is the volume
number and "nn" is the issue number. It is your responsibility to
obtain this archive from your coordinator every week and to distribute
it to the coordinators below you. The method of distribution is left
to your discretion. It is also desirable that you make it available
for downloading by the general user in both archived an unarchived
form, but this is not required.
Network mail distribution -
It is your responsibility to ensure that network mail in your area is
operating in an acceptable manner. Exactly what this involves will
depend on what level you are at, and will be discussed in more detail
below.
Echomail distribution -
Echomail is one of the most exciting parts of FidoNet. Echomail places
you in contact with thousands of users throughout the world on many
varied topics. Below is the September 89 listing for echos carried on
the FidoNet backbone. If you are interested in the complete file which
list the details of each echo, including echo moderator, volume of
traffic and detailed description of the echo subject, you may download
the file ECHOLIST.ZIP from ISA-BBS at 205-995-7739 1200/2400/9600 24hrs
or if your a Fido node just File Request ECHOLIST. Below you will find
a listing of echos and a brief description of the associated topics.
FidoNet EchoList 910
Symbolic Area Name Cross-Reference Listing as of: 10/01/89
Symbolic Area Name Conference Title
-------------------- ---------------------------------------------------------
3RIVERS Three Rivers Chatter
ABLED disABLED Users Information Exchange.
AD&D Advanced Dungeons and Dragons
ADOPTEES Adoptees Information Exchange
AIDS/ARC AIDS/ARC
ALROTISS American League Rotissiere Baseball
AMIGASTAND Amiga Standards Workshop
AMIGA_PROG Amiga Developper's and Programmer's Conference
AMY_POINT Amiga Point operations and TeleCommunications Discussions
ANIMED ANIMED
ARC_WARS Compression Program Users Information Exchange
ASIAN-AMERICAN Asian-American Forum
ASIAN_LINK Asian general link
ASKACOP2 Ask A Cop Conference
ASKATECH National Technical Q&A GroupMail Conference
AT&T AT&T Systems International Support Conference
ATHENS_SYSOP Athens / Northeast Georgia Open Sysop conference
AUDIO Music and Sound
AVIATION Aviation related discussions.
BASEBALL National Baseball discussions/Trading Cards Conference
BBSSYSOP National BBS Sysop GroupMail Conference
BEAMMEUP National Star Trek Discussions GroupMail Conference
BLATZ Gzorniblatz: The National GroupMail Support Conference
BLINKTALK Visual Disabilities Echo
BROADCAST TV & Radio Broadcasting Echo
CANMAC Canadian Macintosh Echo
CONSULTING Consulting International Conference
CONTROV Controversy Forum
COOKING Cooking
CPAA Computer Pilots Assoc. of America
CPMTECH CP/M Technical Forum
CUSS Computer Users in the Social Sciences
CVPCUG Champlain Valley PC Users Group
DATAFLEX Dataflex echo conference
DBASE Database topics, techniques, & advice.
DBRIDGE DBRIDGE
DCJOBS Metropolitan Washington Jobs Conference
DEAR_MARY Gay/Lesbian Advice 'Column'.
DEVELOPE National BBS/Mailer/Utility Developers GroupMail Conferen
DIABETES Diabetes discussions and support
DIRTY_DOZEN The Dirty Dozen echo
DTP Desktop Publishing
ECHO_REQ Echo Requests conference
EDUCATOR Education International Conference
ENDING-HUNGER HUNGER Conference
ENTREPRENUER New Business Start-Up Support
FANDOM Science Fiction Fandom Discussions
FCC Radio and Data Telecommunications Regulation
FDECHO Regarding FrontDoor, the E-mail system
FEMINISM Feminism and Gender Issues
FIREARMS Firearms
FLEET Starfleet National Echo
FLO For Lawyers Only GroupMail Conference
FLT_ACAD Starfleet Academy
FLT_COMM Starfleet Communications
FLT_OPS Starfleet National Operations
FLT_RPG Starfleet National Role Playing Game
FLT_TREK Starfleet On Star Trek
FONTASY The FONTASY Echo
GAMING Gaming EchoConference
GAY_ADS Gay Classifieds and want ads
GDASYSOP Greater Danbury Area Sysop Conference
GRAPHICS GRAPHICS (IBM)
HAM Ham Radio Operators' Conference (General)
HAMRADIO National Ham Radio Enthusiasts Conference
HIKING Hiking, Mountain Climbing, and Camping Echo
HOME-N-GARDEN Home and Garden Echo
HOMEAUT Home Automation Forum
HOME_REPAIR Home Repair Echo
HPHH Hi-Powered (i.e. Hewlett-Packard) Hand Helds
HS HS
HST HST
HST-SALE HST-SALE
HS_MODEMS High Speed Modems 9600+
HYPERION Hyperion Beyond the Gate
ICGAL Issues Concerning Gays and Lesbians
INTERCOOK International cooking
INTERUSER International forum, where borders doesn't matter
JLASER JLASER Support Conference
JOBS Jobs & Employment Conference
JOBS-NOW Current Job Openings
KIDS Kids International Echo Conference
KINKNET KinkNet Adult Echos
KINSEARCH Kinsearch Data Base
KRISHNA Krishna conscious/Vedic topics
LAN Local Area Networking
LAPTOP National Laptop Computer Discussions Conference
LASERMASTER LaserMaster Support Conference
LASERPUB Desktop Publishing International Conference
LIBERTY Libertarian Politics -- Theory and Practice
LRN-NEWS Local National Regional News
MAC_GAMES Macintosh Entertainment/Education
MAGICKNET Neopaganism, Witchcraft, and Magick Conference
MAINFRAME Mainframe computers
MAPPING MAPPING
MARTIAL_ARTS Martial Arts Conference
MEADOW Opus Sysop Information Echo
MEDFILES Medical File Echo
MEDLIT Medical Literature Echo
MENSA International Mensa Echo Conference
METAPHYSICAL Neopaganism, Witchcraft, and Magick Conference--Magazine
METRO-FORUM Metro-Forum
MICHIANA Northern Indiana/South-Western Michigan CHIT-CHAT
MOVIES New & Old Movies & TV discussions
MUNDANE Neopaganism, Witchcraft, and Magick Conference--Chatter
MUZIK Music Discussion
MWM Metropolitan Washington Mensa Echo Conference
MYSTERY Mystery books and stories
NJ-SHORE New Jersey Shore
NLROTISS National League Rotissere Baseball
OBJECTIV Objectivism
OPUS National OPUS Sysop GroupMail Conference
OR.POLITICS Oregon Issues and Ballot Measures
PACKET Ham Radio Operators' Conference (Computer-based technique
PARCOM PARish COMputing: using computers in the Church
PCB_NET PCBoard general sysops conference.
PDP-11 DEC PDP-11 Hardware/Software Echo
PDREVIEW Public Domain & Shareware Software Reviews
PITTNET Pittsburgh Sysop Conference
PNWMAC Pacific Northwest Macintosh Users Conference
POLICE Law Enforcement Officers Nat'l Echo
POSTSCRIPT PostScript Support Conference.
QMX_XRS Quickpoint Mail eXpress and eXpress Response System suppo
QM_BETA QM discussions.
QM_ECHO QM support and discussions
QNX Quantum Software's QNX Operating System
QUICKBBS QuickBBS Support
QUICKPRO QuickBBS Sysop's ONLY Echo
R15_CHAT Region 15 User/SySop Chat
RAINBOW DEC RAINBOW conference for users of Digital's Personal
RECFRP Role Playing Games
RECORDS Music and Records Discussion
RECOVERY Addictions recovery related discussions
REGION11 Region 11 Sysops conference
ROCKROLL Rock & Roll Discussion GroupMail
RONDACK Adirondack Regional Echo
SCUBA Self Contained Underwater Breathing Apparatus
SEADOG SEAdog Front-End Mailer program
SEAPUPPY SEAdog Front-End Mailer program
SEARCHLIGHT SearchLight BBS Owner's Echo
SEATAC SEAssociates Technical Area Conference
SF Science Fiction and Fantasy Literature
SFCON Science Fiction Convention Organization
SFFAN Science Fiction and Fandom
SHAREWRE InterNetwork Shareware Discussion Conference
SHORTWAVE Shortwave listeners conference
SINCLAIR Sinclair Users Unite!
SINGLES Singles - Adult discussion for people 21+ years old
SMART SMARTWARE Conference
STAMPS National Stamp Collecting GroupMail Conference
STARGAZE Astrology Echo, How And Why
STARTREK National Star Trek Discussions GroupMail Conference
STRATAC Strategy & Tactics Echo
STTNG Star Trek: The Next Generation
SUBSPACE Fleetnet SysOp's Echo
SYSLAW SYSLAW
SYSOP Sysop National Echo Conference
SYSOP227 Net 227 Sysops conference
SYSTEM3X National IBM Mini Computer GroupMail Conference
TALLY-NET Tallahassee NetWork Chatter Echo
TECH Hardware/Software general discussion conference
TELIX Telix Users Information Exchange
TEXTUNES TexTunes<tm> Music Exchange Echo
THI_CVA Brain Injury
TH_ING Treasure Hunting and Collecting
TI-ECHO TI home computer discussions.
TPBOARD TPBoard BBS Topics
TVRO Satellite Television Receive Only
VAX VAX conference for users and managers of Digital's VAX
VENTURA Ventura Publisher Support Conference
VIDEO VIDEO production
VT_DEBATE Net 325 Debate Conference
VT_GENERAL NET 325 General Conference
VT_PROCHOICE Net 325 Pro Choice Conference
VT_PROLIFE Net 325 ProLife
VT_SALE Net 325 For Sale Conference
VT_TECH Net 325 Technical Conference
WANT_ADS National Non-Commercial For-Sale/Want Ads Conference
WAR-ROOM Tallahassee Network War-Room
WARGAMES National Wargamer's GroupMail conference
WATSON The WATSON Echo
WELMAT Welmat Support Echo
WHO Dr. Who & British SF-TV
WILDRNSS Wilderness Experience
WRITING Writing and Publishing
ZMODEM ZMODEM
If you are a sysop of a local bulletin board, or a prospective sysop
interested in acquiring echomail for your system, you should contact
the local Net Echomail Coordinator (NEC). For the phone number of
the NEC and Fidonet host in your area, see the Host List above.
For more information about participating in Fidonet mail activities
leave a message with your voice number to your local Fidonet Host
Sysop.
-----------------------------------------------------------------------
Berlin Wall Interview
by Karsten Propper
The Berlin wall is down, and some people will remember it more than
others will. My father is one of those people. I have interviewed him
on his feelings toward the event. His name is Peter Propper.
Karsten: Where in Germany were you born and what side of Germany was
it on?
Peter: I was born in the small town of Kohlhohe. It is now under
Polish rule. It would now be on the eastern side of the wall.
When I was born there in 1940, it was under German
administration. It has been administered by Poland since 1945.
Karsten: When you lived in Germany, it was a united country, tell me
your feelings toward the separation.
Peter: The Berlin wall was built in 1961, and was a true indication of
the way the Communists decided to rule that side of Germany.
They wanted to make it perfectly clear that that part was under
communist regime. They didn't want to let anyone out or in. The
monumental and typical indication was the building of the wall
in Berlin. To see this country of the Third Reich, and a
beautiful city like Berlin, which up to 1945 had been the
capital of Germany, to see it divided, to know about the
families that had been ripped apart was terrible. The ones that
couldn't make it to the west had to remain in the east. It was
hard to commute, and was just a big hardship to deal with
losing both the war and their family.
Karsten: Did you have any relatives in the East? If so, how did you
feel about being separated from them?
Peter: I was relatively young when I came to the western side. I had
not known them well at all, and had no emotional attachment to
them. I knew that it had been a great-aunt and a great-uncle.
They had not gotten to the western side in time as we had. They
are both dead now, so I have no more relatives in the eastern
side.
Karsten : I would now like for you to discuss your feelings toward the
tearing down of the wall.
Peter: It indicates that the younger generation of the east block
countries has been rebellious. It has indicated by their
rebellious action that they can't take communist rule any more.
They have mainly through exposure through the media from the
west as to how prosperous it can be in a capitalistic country.
The tearing down of the wall is a perpetuation that the fight
against communism in east block countries is under way and that
it will be a matter of time before these countries will have
some sort of a democratic government. The tearing down of the
wall is a big symbol to me and is like having a bunch of hands
shake the ones of the western. It is like having found again
long-lost friends. I think it is a matter of time before the two
countries unite.
-----------------------------------------------------------------------
Review & Overview of ProDoor 3.1 of 10-08-89;
Copyright (C) 1987, 1989 Samuel H. Smith
by Ricky Morgan
File Transfer
Before I get started into this months subject, let me correct an
oversight. In last months Overview I neglected to point out a couple of
important things that you should know about when working with ProDoor.
First your terminal software should be configured for ANSI support or
you're going to have some problems in dealing with ProDoor, also if you
can't display 80 columns, you may find it difficult in working with the
displays and full screen editor that ProDoor affords you. There may be
still other problems that you could run into that I'm not aware of.
To cover my hinney even further, let me say that, the commands that
will be reviewed here are based on PCBoard (R)-Version 14.0/D and
ProDoor version 3.1 (Registered) as they exist on the Crunchy Frog BBS.
Different boards run different revisions, but most of the commands will
apply with only small variation. If you have problems in PCBoard, Help
can be obtained by paging the SySop, (!only kidding!), by typing H from
the Command prompt, and you will have access to the help menus. In
ProDoor help is as easy as typing a question mark (?) at the command
prompt.
We all call Bulletin Board systems for different reasons, the
messages, the people, the arguments, the anonymity and certainly to get
FREE software (of course it may not always be free, as often times there
is a registration fee and this is only fair). So far I have found two
separate ways to obtain this software. The first involves developing a
relationship with a respective SySop, then visiting him in the pretense
of writing articles and while he's busy lecturing on the benefits
associated with being a SySop, you covertly suck the files out of his
computer as you suck down his food and drink; smiling all the time and
nodding appreciatively at the proper time to show you respect his
wisdom. The other way is to Download them directly from his computer to
yours over the phone lines. This way may be faster and easier but you
don't get the food and drink, plus you will have to actually Upload
files at sometime in the future, as most SySops frown heavily at file
leeches (people who download files without uploading files); this also,
in it's own way is only fair.
If you opt out for the Download option, you will want to be able to
Download in the fastest and most efficient manner and hopefully avoid
getting duplicate files, as sometimes people will upload files, changing
the names to make them look different (it happens) and in defense of the
SySop, he does not always have the time to review each file upload as
carefully as he would like.
All this out of the way, let's get started.
As I have said, ProDoor supports PCBoard compatible commands; with
enhancements. Most notably ProDoor allows you to stack commands to
greater extent that PCBoard. All this says is, if you are familiar with
the command set of PCBoard, you won't have to re-learn a whole new
command set to take advantage of ProDoor.
I had hoped to avoid an extensive Command comparison, but the
extent of commands and the diverse experience that each person has with
the BBS is going to force me into some comparisons. I'll try to keep
them short and as informative as possible without (hopefully) getting
boring.
(F)ile Directories
------------------------------------------------------------------------
This command, basically the same under ProDoor as in PCBoard,
allows you to view a listing of the files available. After selecting
(F), a listing of the file directories available will be shown - usually
grouped by category. To view one or more of the directory listing
files, enter the number to view. Multiple listings can be viewed at the
same time by entering several numbers at the same time. Again stacking
the commands are acceptable under both PCBoard and ProDoor.
Subcommands: (#) (D) (L) (N) (R) (U) (V) (Z) (NS)
(#) the directory number to view
(R) Re-lists the directory menu
(U) Display Upload Directory
(V) View contents of a compressed file
(Note: the (V) parameter is not always
available under PCBoard and if it is
may only support viewing file that have
.ARC extensions. For a better description
of (V) see the commands (VX) and (F V)
listed below.)
(NS) displays request in non-stop mode
So the command, F 1 2 3 NS under either will get you a non-stop
listing of file directories 1, 2, and 3.
(L)ocate Files by Name
------------------------------------------------------------------------
Allows you to search the file directory listings for filenames
which match those you are looking for. You can also use valid DOS
wildcards in your filename request if you are unsure of the exact name.
Again all subcommands are supported in PCBoard and ProDoor.
Subcommands:(filename/wildcard) (A) (U) (NS)
(filename/wildcard) is the filename to scan for
(A) scans all available file directories
(U) scans only the available upload file directories
(NS) displays listing in non-stop mode
So to find all files that begin with BTN, you could enter the
command, L BTN*.* A NS. This would search all available directories for
any file starting with BTN, with any extension (.zip, .arc, .txt, etc)
and give you a non-stop listing.
(N)ew Files by Date
-----------------------------------------------------------------------
This will display file listings based on a date scan of when the
file was placed on the system. Matching files are those found which
have a date equal to or later than that requested.
Subcommands: (date) (A) (U) (NS)
(date) is a valid date in mmddyy format (no spaces!)
(A) scans all file directory listings
(U) scans only upload file directory listings
(NS) displays output in non-stop mode
ProDoor adds a couple of extra options here. You may specify
directories to search, i.e., N 3 4, (which searches Directories 3 & 4)
or N S A, which will search for files new since the last time you were
on the system.
(Z)ippy Directory Listing Scan
-----------------------------------------------------------------------
Allows entering a word or words (20 characters max) which will be
checked against all text in the directory listings for a match. The
text you enter can be in either UPPER or lower case letters, since the
software is NOT case sensitive and will find any matching text -
regardless of the case of the letters. Commands and subcommands, again,
are both supported in PCBoard and ProDoor.
Subcommands: (text) (#) (A) (U) (NS)
(text) is the text you wish to search for
(#) is any valid directory number
(A) scans all directory listings for the text input
(U) scans only the upload directory(s) for the text
(NS) displays screen output in non-stop mode
As you exercise the above commands and become familiar with their
operations, you will, no doubt, locate a file that you would like to
download. From past experience with downloading files from BBS's there
are two commands that, I think, are well worth getting very familiar
with. For example, you locate a good game, that from description, sounds
like something you would like to have. You Download it, unarchive it or
unzip it, what ever, and run the program only to find that you already
have a copy of the same program that you got off another board; under a
different name. Crying to the SySop that you want your download credits
back probably ain't going to get it. The way to avoid this problem is to
use either of the following commands.
(F V)iew-File View and Extract (optional)
-----------------------------------------------------------------------
Available under ProDoor only, this allows you to list contents of
any ZIP file and optionally view the text files without downloading. It
is also possible to "extract" parts of a ZIP file into FROGS1.ZIP (this
is a system defined name for the file you build and will vary from
system to system) for downloading. If you View a file, or extract parts
into the system file for downloading the file will automatically be
flagged for downloading and will stay with you until you download it or
exit ProDoor. An example of usage would be:
F;V;file (file=name of file you wish to view)
This will give a verbose listing of component files within
file.ZIP. The system will them prompt you for text viewing or extraction
of component files. In short you can now unarchive the files on-line,
view the associated text file (generally Documentation files) and get a
good idea about what it is you are downloading. No more Russian roulette
with file transfer.
(VX)quick Quick view/extract ZIP file contents
------------------------------------------------------------------------
Much the same as F V function this will allow you to view the text
files in an ZIP file without downloading. It is also possible to
"extract" parts of a ZIP file into FROGS1.ZIP for downloading. Usage
would be:
VX file (file=name of file you wish to view)
This will skip the verbose listing and goes directly to text view and
extract function.
Let me clarify 'Extract' at this point. You may, under ProDoor
using the (F V) or (VX) functions, extract selected files from the files
that have been compressed. Lets say that you want to download a program
that has lengthy document files archived with it. You're the
adventuresome type and you don't want to waste download credits getting
something as mundane as document files explaining the operation of the
program. With (F V) or (VX), if done properly, you may move selected
files into a system temporary file for downloading later. In other
words, it allows you to get only the files you want from within an
archive. ( I don't recommend downloading the programs without the
Doc.'s. I simply used this as an example.) This lead us up to the next
command available under ProDoor.
(REPACK) Files for compression.
-----------------------------------------------------------------------
Re-pack ZIP file with maximum compression. This selection will
re-compress a selected ZIP file and store the result in FROGS1.ZIP. Not
all uploaded file are packed or archived with maximum compression. Using
this will allow you to squeeze every byte possible to save on those
download ratio's.
Also, if you don't use the archive utility that the file is saved
under, you can specify an alternate format to convert files to a format
you can use.
Examples:
REPACK TPC14.ARC LZH ;convert .ARC to .LZH format
REPACK PRODOR30.ZIP ZOO ;convert .ZIP to .ZOO format
Currently The Crunchy Frog will support, extraction, viewing and
repacking between ZIP, ARC and LZH formats. You should check with the
system you use most to determine which formats are supported.
(TEST) zip validity
-----------------------------------------------------------------------
If you are worried that the file you want may be corrupted or if
you attempted to download it and couldn't, or you did download it and
the program doesn't work, you may want to try Test. It will test the
validity of a ZIP file. This ONLY tests the integrity of the ZIP archive
function. It doesn't test for viruses or defective files compressed as
such. It will merely assure you that the file you are trying to get was
compressed properly.
Usage is:
TEST Filename
The system will test the integrity and report to you of any
problems encountered.
I've covered a lot of territory and all we've talked about so far
is looking at files and determining if you want them. By now you're
probably thinking, 'Wasn't this article supposed to be about File
Transfer?'
Yes it was (and is) and now I'm getting into Uploading and
Downloading; but first....
We know how to locate files and manipulate them so that we are sure
it is the file we want. Now we Download, right? Nope, you have to tell
the system with protocol you want to use. HUH? This is a review of
ProDoor and not transfer protocols so all I will say about the subject
of protocol is this...your system's protocol must match the system's
protocol that you're calling or else it won't work. *(I'll leave a
review of protocols to more competent people.)
*Editor's Note: See BTN002, BTN013, and BTN015 for excellent
coverage of the various transfer protocols.mm
(T)able of protocols
-----------------------------------------------------------------------
This command lists the protocol driver program command lines used
to implement the various protocols. The estimated efficiency of each
protocol is included in this report. These are SySop selectable so your
system may list different ones. ProDoor itself can support up to 100
different protocols. Because of size I'm cutting out the command line
for each, as it's not needed in this context.
Transmit Zmodem Batch. (90%)
Transmit Zmodem Batch (PCP). (85%)
Transmit Zmodem Resume Aborted D/L. (90%)
Transmit Ymodem Batch. (88%)
Transmit Xmodem-1K (Old Ymodem). (88%)
Transmit Slow Xmodem/CRC. (80%)
Transmit Slow Kermit Batch. (60%)
Transmit Window Xmodem. (88%)
Transmit Qmodem-1K-G (Full flow). (95%, MNP)
Transmit Ymodem-G (registered dsz only). (95%, MNP)
Receive Zmodem Batch. (90%)
Receive Ymodem Batch. (88%)
Receive Xmodem-1K (Old Ymodem). (88%)
Receive Slow Xmodem/CRC. (80%)
Receive Slow Kermit Batch. (60%)
Receive Window Xmodem. (88%)
Receive Xmodem-1k-G (full flow). (95%, MNP)
Receive Ymodem-G (registered DSZ only). (95%, MNP)
Just for the sake of comparison; let's look at the protocols
available under PCBoard.
PCBoard selectable Protocols:
(A) Ascii (Non-Binary)
(C) Xmodem-CRC (CRC)
(F) 1K-Xmodem-G (Full flow)
(G) Ymodem-G (DOOR 1 only)
(O) 1K-Xmodem (Old Ymodem)
(X) Xmodem (Checksum)
(Y) Ymodem Batch (DOOR 1 only)
(Z) Zmodem (DOOR 1 for batch transfers)
(N) None
You will notice that even from PCBoard, the SySop has chosen to
restrict the use of Ymodem-G, Ymodem Batch and *Zmodem to DOOR 1, which
is ProDoor. This leaves you with only ASCII (only good for text
transfer), Xmodem-CRC, 1k-Xmodem-G, 1K-Xmodem, and Xmodem to choose
from; all good protocols, but in the ever changing world of BBS
communications, not the best or fastest.
*Editor's Note: Crunchy Frog does allow Zmodem from PCBoard but
only for single file transfers.mm
I'm not trying to take pot-shots at PCBoard here, it is a very good
program; PCBoard supports up to 26 different protocols and is extending
the list with each new release. The object is ProDoor offers more.
Once you've told the system what protocol to use you can start
downloading. ProDoor will step you through the transfer or you can stack
the commands.
(D)ownload file(s)
-----------------------------------------------------------------------
"Downloading" refers to moving files from the system you're calling
to your system. You can also "stack" (S)tart or (G)oodbye after the last
filename to immediately start the transfer.
Examples:
D Filename ;download file, you will be
prompted if further info is
needed.
D Z Filename ;Download using Zmodem protocol
D filename S ;immediately start download of files
D file1 file2 G ;immediately start d/l of files,
goodbye at end
(U)pload file(s)
-----------------------------------------------------------------------
Move files between your system and the board that you are calling.
Examples:
U filename ;upload file, you will be
prompted for further info.
U Z file1 file2 ;upload using Zmodem
It's really simple once you get the hang of it. I have (in the
interest of length), tried to keep this short but I see it hasn't
worked. The best advice I can give you at this point is try the commands
for yourself and see what happens. I think you'll find that the more you
use ProDoor the more you'll like it.
Next month I'll try to cover the Message Utilities.
ProDoor 3.1 Copyright (C) 1987,1989 Samuel H. Smith.
PCBoard is a registered trademark of Clark Development Company.
---
* Via ProDoor 3.1R
-----------------------------------------------------------------------
PRO FILE
by Chris Mohney
The Pro File is a short, half-serious biographical sketch given to
various computer telecommunications personalities around Birmingham.
Victims are selected randomly from a group of names put into the
notorious Hat. Anyone who thinks himself brave or witty enough may
petition for admittance to the Hat by leaving E-Mail to me (Chris
Mohney, most boards around town) to that effect. Anyone who wishes to
suggest more questions or sneakily nominate someone without their
knowledge may take the same route ....
---------
Pro File on RANDY HILLIARD
---------
Age: 35
Birthplace: Birmingham, Al
Occupation: Industrial HVAC serviceman
My hobbies include: Computers, motorcycles, reading, writing, & sex as
an art form.
Years telecomputing: 3 1/2
Sysop, past/present/future of: Channel 8250
My oddest habit is: Co-editing this rag.
My greatest unfulfilled ambition is: Becoming a wealthy philanthropist
The single accomplishment of which I am most proud is:
Illegal in at least 5 backward states.
My favorite performers are: Boston, Kansas, Heart, Linda Lovelace
The last good movie I saw was: Dream A Little Dream
The last good book I read was: Bawdy Babes & Lusty Lasses
If they were making a movie of my life, I'd like to see my part played by:
Silverlock
My pet peeves are: People in check-out lines who wait till the cashier
rings their purchase up and then look like "What! I
have to pay for this? Well, let me find my wallet."
Have your money ready, geez.
When nobody's looking, I like to: Write sordid tales of demented
adventure.
-----------------------------------------------------------------------
Amiga On The Loose
by Richard Foshee
(C) 1989
Focus On: Multitasking
NOTE: I am not an expert on the Amiga, this is just information as it
has been explained to me, any error's are apologized for, but feel free
to correct me.. (Perhaps in your own BTN article?)
Recently Kelly Rosato scribbled into text the toutings of various
multitasking programs, and options of multitasking with the IBM systems.
So I thought that I'd follow the wagon and see if I couldn't describe
how the Amiga's multitasking operating system does its wonders. And with
that said, the hard part begins.
The entire line of Amiga computers use as it's main processor, the
Motorola 68000 (With the exception of the Amiga 2500, which uses the
Motorola 68020). However in the game of multitasking, the main processor
has little to do with it, since the Amiga's are blessed with four
extremely important custom chips. Three of these chips are the Agnus,
Denise, and Paula chips. The Agnus chip is the one that assumes control
over most of the machines graphic work, although all of the three custom
chips have some graphic functions to perform. The Agnus chip receives
information from the 68000 chip, then takes total control of rendering
all graphic work, while the 68000 remains free to do whatever else is
asked of it. I mentioned earlier that the Amiga has four custom chips,
this is somewhat of an inaccuracy, but the machine does have a fourth
chip that plays a HUGE graphic role, and this is a Blitter chip (Which
lot's of other companies are scrambling to put into their machines). The
Blitter chip helps the Agnus chip tremendously in all graphic functions.
But enough of the custom chips, this article is about
multitasking, right? All other computers that use some sort of
multitasking routines, rely on some sort of software, I.E. Widows, or
Desqview. (Although new operating systems for the IBM now have
multitasking built in, I.E. Unix).
The Amiga was designed from the beginning to be a multitasking
machine, and to be upwardly compatible with newer Motorola CPU chips.
Once the CPU receives information to perform a task, it sends this
information to whichever custom chip is responsible for performing that
task, then the CPU has nothing left to do. It (The cpu) get's onto the
system bus, sends the information to its custom chips, then get's off
the bus, and can then perform other tasks.
Unlike some of the multitasking programs for other machines, the
Amiga's style of multitasking let's all programs run concurrently. So
there is no program 'pausing' while it does a single task. All programs
that are loaded into the Amiga, are assigned a priority (Which is user
changeable from -127 up to 128 (128 being the highest possible
priority)). All programs are then processed in accordance to their
priority, although this might lead someone to believe that the lower
priority programs might be held, this is not the case, the priorities
simply tell the machine which programs to give MORE attention to, the
programs with lower priorities would still be running, albeit a bit more
slowly. Unless otherwise specified, all programs that are loaded, will
have their priority assigned at 0, which would make all programs receive
equal time from the machine. Personally, I have a disk with all kinds
of programs that I use a lot, or are helpful to me, this disk
automatically runs a total of 14 programs, from its startup-sequence
(IBM equivalent AUTOEXEC). Some of the programs that are run are, a
Virus Checker, a Mouse Accelerator, a Shell program, a Disk Buffering
program, and a great variety of other programs that perform specific
functions. All of them run at 'Full Speed', as if they were on a single
tasking machine, with little or no slow down. The Amiga is capable of
running as many programs simultaneously, as it has available memory.
While Bill Gates (Chairman of MicroSoft) says that "True multitasking
won't work in a 1MB system" he fails to say that the Amiga is capable of
multitasking in FAR LESS memory, or that his own companies program
"Amiga Basic" will also multitask admirably with extremely low memory
requirements. Multitasking on a 256K Amiga, is QUITE possible, and runs
very well. He was of course talking about OS/2, which takes more memory
to load itself into, than most Amiga users have ever DREAMED of owning.
And while Apple is currently working a a 'great' new operating system
for their 680x0 based machine(s), guess what is missing, MULTITASKING,
although we all know how impossible is it to multitask the Motorola
680x0 chips, don't we, to bad no one told Commodore. Anyway, I've gone
on long enough, and have probably not explained this very well, but if
you have any further questions please fell free to ask (Corrections are
also accepted!).
-----------------------------------------------------------------------
Is There A Dark Contagion?
by Percy Peabody
Foreword:
The opinions expressed within this article are not necessarily the
views of the editors of, nor of any of the other contributors to the BTN
newsletter. They are my own opinions,and shall remain so, and due to
the possibly volatile nature of the content, I will remain anonymous as
did the author of the original article which inspired this one. The
concept of this article is excerpted from the article entitled DARK
CONTAGION in the December issue of PC Computing Magazine, so I can only
give credit to the pseudonym of Peter Stills for any quotations I may
make from the article.
While looking through the latest issue of PC Computing, browsing
through the reviews of the new 486 machines which were the headliners, a
very large and bold title caught my eye, which was DARK CONTAGION, under
which there was a youth clad in a dark flight jacket, donning a ball cap
on a nearly shaven head, and the Swastika emblem affixed to the lapel of
the jacket. Then I read the red subtitle which read "Bigotry and
Violence Online." Being caught somewhat off guard by this, I gave it a
better look to see to see what this was all about.
Basically, the article was an expose' on the use of BBS's for the
cause of recruiting membership in and actually planning activities of
such radical right groups as the Skin Heads, the KKK, W.A.R. (White
Aryan Resistance), the Neo-Nazis, just to name a few. It went on to
describe the linking of such activities to the deaths of three youths in
Bethesda, Maryland last December from accidental explosion of a homemade
bomb, the recipe for which the youths obtained from such a board, and
the announcement of "purges" and beatings and killings, and for the
multi-node systems, the logging of chat activities where membership was
actually encouraged to beat the homeless with baseball bats rather than
set their clothing afire.
Essentially, the article was almost praise to the technical
advancement of such groups, and the education of the users of such
systems of the limitations of the law, yet at the same time pointed to
the handicaps of the FBI in the investigation of the cases related to
propagation of dissent via the electronic systems thanks to the
Electronic Communications Privacy Act of 1986, and the Wire Tap Act of
1968. Point blank, if a message is earmarked as private, then it cannot
be used as evidence against the sender or receiver in criminal cases,
and according to the Wire Tap Act, interception of such private mail
requires a court order for wire tap for it to be classified as evidence
in a case. Of course, in the case of having a court order to wire tap
someone's private phone, the lessor of the line must be notified of the
tap, so there goes the good stuff.
The article stated that the majority of the activity was done under
assumed names anyway, so how is the FBI to trace the"handle" to an
actual person? With the recent uproar in the use of, versus the
disallowing of, handles on the local BBS's, it roused my curiosity. Is
there some ulterior motive for the use of handles in the Magic City? Is
this scourge of a favorite pastime of mine closer to home than I like
to think? Now some like to consider the BBS a harmless hobby, and the
means for enrichment of one's software library with programming donated
as public domain and/or shareware. How harmless is this hobby if it is
the means of distribution of propaganda for racism, or the shareware
happens to be the recipe for car bombs? How harmless is it if it is
instruction on the proper application of a baseball bat to make sure the
skull is properly split on the first blow?
Leonard Zeskind, research director for the Center for Democratic
Renewal, dubbed the white supremacist techno-junkies as "a Klan without
robes" and that the "electronic networks represent a high-tech twist on
the early white-sheet days of the Ku Klux Klan."
When in high school, I prepa
red a term paper on the KKK based on
historical research, the origin of which had nothing to do with racism.
The origins of the KKK was actually a college fraternity, here in the
south in an unnamed town, which was founded shortly after the Civil War,
whose primary goal was to thwart the Carpetbaggers' derogating of the
Southern State's inhabitants. It was twisted to secretive racism in the
20's,long after the demise of the Carpetbagger's day, by the
disagreement with the new federal laws imposed granting more rights to
Blacks in the South. The primary activity was in the larger cities of
the South, but soon spread to the rural areas by the increase in
membership in the Klan, and the essentially unchecked placement of
members in higher ranking political positions. Not until the sixties,
would the real awareness of this problem come to an explosive head, and
be realized by the riots and demonstrations, and ultimately the forced
integration of schools. I remember these times well, being escorted
home from grammar school by armed police, and nightfall curfews.
A lot of concern is expressed on the abuse of drugs and abortion
rights, but I think there is a more impending doom looming over the
heads of our society, related closely to the recent increases in youth
crime and racist activity. Organizations such as the SkinHeads are now
boasting national memberships of 3500+, and growing, and now have the
technology to schedule "social events" nationwide within a day's time
via the use of networking software and private BBS's.
Are we again returning to those times of violence, with better,more
sophisticated information systems, which also includes the hacking of
police computers, gaining access to schedules of police activity on
certain cases, therefore, forewarning of nearing threat to the movement?
Is there really a DARK CONTAGION worse than any software virus ever
dreamed of being?
To me, this is clearly a shadow on the BBS community as I know it,
and it really disturbs me to think that perhaps some of the people
behind handles in our telecomputing community may indeed be SkinHeads or
Neo-Nazis. Back boards, secured conferences,limited access due to
obscure reasons, leave considerable doubt as to the intentions of the
operation of a Bulletin Board Service. Locally, we have a network which
can spread a single message across some 15 services in the Birmingham
area overnight. This linked with some of those 15 services also using
national nets will add another day to the propagation of a coded
announcement, so if I wanted to alert someone in Washington, DC of the
upcoming "party," then I have only 4 days to wait for a reply at the
outside, unless I log on to the particular board carrying the national
net, in which case, I have only 2 days wait if the receiving party is
monitoring for mail from me. I do hope the System Operators of the
boards running the national nets do not think I am pointing any fingers,
as I have seen nothing that indicates such activity, but then again,
would anyone be so bold as to participate in this type of activity on a
board that is not known to be secured? And can I really see all of what
is going on behind the scenes, meaning is there a door to a back board
for the membership of such groups on some of the local BBS's? I don't
know, and don't really want to. The intent of this article is not to
stain national nets or the systems that carry them, merely to ask
questions that have arisen in my mind since reading that article.
I have personally met persons of many creeds, moral beliefs, and
religious choices, and have yet to see anything out of the ordinary
along the lines of white supremacy or racism of any sort. I hope this is
because it just isn't here, and that I have a well founded hope and
faith in the local systems to be free of this sort of bigotry and
hatred. But after reading that article, it begins to make me wonder if
I am living in some sort of a pipe dream that this type of activity has
not infested the telecomputing community in Birmingham.
-----------------------------------------------------------------------
Insights: A Modest Proposal
by Ron Albright
I remember my first computer with almost (operative word "almost")
the same sense of excitement that I did my first kiss or my
first...well, car. It was June, 1981. In the early stages of the "Home
Computer Price Wars."
It was a terrific time for new computer buyers. The "Home Computer"
was the watchword and the major players in this low-end market were
Texas Instruments, Commodore, Timex-Sinclair, and Atari. I have
purposefully excluded IBM and Apple whose products were well outside the
price range of the casual enthusiast. The major products were the TI
99/4A, the Commodore 64 and VIC-20, the Timex- Sinclair Z80, and the
Atari 400 and, later, 800.
I went to a local Service Merchandise store, like millions of other
parents with the idea I was going to get something to help educate the
kiddies on what was surely to be the "Wave of the Future," computer
literacy. What I really was after was a computer for me. I was seduced
by the idea that a computer would somehow make my life easier and more
fun. After some teeth-gnashing and second guessing, I bought the TI
machine - at $329, the 16K silver-and- black console had it "all." I
wasn't at all sure what it "all" was, but the ads featuring Bill Cosby
confirmed that the 99/4A did, and that was good enough for me. I plunked
the money, bought a couple of cartridges (one for the kids - "Munchman,"
a PacMan clone) and one for me ("Tax and Investment Record Keeping"). I
was told I needed a disk drive, so I dropped another $500 or so for
that. I was ready for an adventure that has yet to end. After convincing
my wife that it was "for the kids," I proceeded to lock the door to my
office and began learning about "computing."
I bring all this up now because I think we all owe so much to these
pioneering little machines. I know I do. Probably many of you started
with one machine and have since moved up and on to another, more
powerful model. The little TI (which I eventually and over the course of
the next 4 years must have spent $2500 expanding with modems, RS232
interfaces, printers, memory expansion, and software) taught me 90% of
what I now know about computers. When I upgraded to an IBM clone in
1986, the knowledge I had come by using the /4A stood me well in this
new genre of machines. I thought I was use a few axioms carried on with
me from the TI to show you just what these "Classic Computers" have left
us.
1. Computers seldom die; they just get unplugged. The very same
console I bought in 1981 is still running. Plug it in and it lights
up and computes just as well as it did when I popped open the box.
Sure, I have replaced the keyboard (the keys started sticking and
displaying 20 "A"'s when I only wanted one), but nary a chip,
solder, or diode has faulted.
2. Computers are not terribly fragile. I learned early on, not to be
intimidated by computers. Since I could get a replacement for the TI
for $25 when they went out of production, I got more and more brave
when it came to "pooping the hood" and taking a look. I installed
cards, hot-wired cables and modems, and replaced keyboards without a
bead of sweat. When I got my new, shiny IBM, I never lost the
hacker's mentality. When others, new to computers, got their IBM's,
they hired "experts" to install boards for them, and paid exorbitant
prices for cables and memory upgrades. A whole new industry arose.
Since I had cut my teeth on a pioneer, I simply kept doing on my
$2500 monster what I was doing on my $25 bargain- basement TI. I
would hesitate to guess how much money I have saved by being a
"pioneer" (you know, the ones you pass on the trail of computing
lying at the side of the road with arrows in their back?). I owe it
all to the TI.
3. Basics are basics; concepts are concepts. The (now) rudimentary
editor that I used with the TI taught me all the basic of word
processing. I mean, folks, there are only a few ways you can cut-
and-paste, block-copy/move, set margins, etc. When I stepped over to
WordPerfect, what I carried with me from "TI-dom" allowed me to
start a quantum leap ahead of the new computerists. Ditto for
spreadsheets, databases, and telecommunications. Power and speed may
change, but concepts do not.
With these tenets in mind, I think I have a solution to the problem
of computers in the schools. We all know there are too few and we all
know it is due to cost constraints. In most U.S. schools, there are
20-30 students per computer. If the students are lucky enough, they get
an hour or two per week on the keyboard. We know that is not enough but
can't afford to improve it.
Why don't we try this: Given that
A. Computing is computing - regardless of the brand name stamped on the
cover, and that
B. Basic software concepts are constants (how to do the functions are
not but are not related to the computer, themselves), and
C. Computers are hardy devices that will, with a modicum of care, last
probably a decade, then:
Why don't we start a program to revive the "orphan" (defined as out
of production) computers of the world? Let's start PTA-driven drives to
ferret out these closeted classics and move them into the schools where
they belong. Let's make PTA membership dues payable by donating a
computer - any computer - to the school. The owners will get a tax
write-off and the schools will get a warm CPU. Let's get the children
out in the neighborhoods - not selling Christmas wrapping paper or candy
- but asking people to go into their attics and resuscitate their old
computers for their local schools. Let's plug these up all over the
classrooms and turn the kids loose on them. Instead of "Computer Labs" -
a sequestered, hallowed hall where all the school's computer lay
enshrined (and unused) - let's have them all along the walls of every
classroom. Plugged in and ready to roll. Lay a few software packages
(probably cartridges and an occasional cassette tape), and Viola!
Purists will argue that this will never work. A teacher cannot be
expected to know the idiosyncrasies of a dozen different brands of
computers and can never teach the class to use such a potpourri of OS's.
I say, correct! Why try? I tell you what I think. If you have the
computers around, have them plugged in and give the students time to use
them, the teacher can sit back and watch. The children will become
expert in no time. They will teach each other. Ever try to learn a
Nintendo game? How to jump, shoot, dodge, find secret doors, etc. I
never can. But give one to one of my 9 year old twins, and within 30
minutes they are on board number 12 and racking up points in the high 6
figures. Children approach computers differently. we want to know "why"
- they only need to know "how." They find out by trial and error and
move on....and on, and on. Computers are not barriers to them. They are
fun and they are tools.
How many computer classes have ever taken a computer apart? I dare
say, probably few. With the lil' orphans, they can whip out a Phillips
head and go at it. Find out what makes them tick. What's the harm?
I think it will work. I think it's an idea so simple that it's been
overlooked for much too long. With millions of TI's and VIC-20's, Coleco
ADAM's, and Sinclair's stored in the attics and closets of America,
there are plenty to get the classrooms up to speed in no time. I think
it's time we started. I have a TI 99/4A I'll donate today. I'll keep the
other two for the twins. What about you?
For comments:
CompuServe 75166,2473 Ron Albright
GEnie RALBRIGHT 1160 Huffman Road
DELPHI INFOINC Birmingham, AL 35215
MCI MAIL RALBRIGHT
-----------------------------------------------------------------------
A Look Into The Twilight Zone
by Richard Kushner, Jacksonville Atari Computer Group
via ST Report, downloaded from Delphi.
EDITOR: I can't publish this article. It is much too outlandish for
anyone to believe.
AUTHOR: Well, how about if I make it sound like a fairy tale ?
EDITOR: We could try that. But, really, it's so far beyond belief,
that even as a fable it strains all credibility.
AUTHOR: Yeah, I know. Too bad it's all true.
This is a fantasy... Pure Fantasy!
----------------------------------
Once upon a time there was a widget maker named Nelson Brindell.
He loved to tinker and, from time to time, managed to invent
something that someone was interested in selling (and buying).
One day he invented a widget that hooked to the Video Box, so
that people could play games on the Box. And people liked it
very much, and made Nelson a wealthy man. So successful was Nel-
son that, as it often happens, a large company (in this case, the
Wilson Sisters company) offered him lots of money to buy his com-
pany. And he sold it and went off to invent more widgets (even-
tually producing ones that walked, talked, and even made pizza).
Now the Wilson Sisters had an idea that they could capitalize on
Nelson's work to make his widget into a product to compete with
the Avocado, a well known character manipulation device invented
by those famous brothers Stephen, Woz, and their other brother
Darrel. And they named their device Katanga, a Sanskrit word
having no English equivalent. And many grew to love and support
the Katanga and heap abuse upon the Avocado and its ilk. And
people liked the Katanga very much and all was well.
For a while, at least. For on the other side of town the Admiral
Tool and Die Company, headed by John Trample, thought it could
use its cunning methods for cutting corners to make an Admiral
device that would do everything the Katanga and Avocado could do,
but at half the price. And they proceeded to do just that, and
mayhem descended upon the world of widgets, with prices dropping
faster than... well, faster than just about anything you could
imagine. And many grew to love the Admiral and heap abuse upon
the Katanga (not to mention the Avocado).
Now pay attention, because the story gets very confusing at this
point. So confusing, that if this were a soap opera, the next
paragraph would take at least six months to tell. (Diagrams of
all the moves and counter moves are available upon written re-
quest and payment of a $5.00 handling fee).
Ray Major, who dreamed up the Katanga, left Wilson Sisters and
invented a better Katanga, which he called the Freundlich. While
he was doing this, John Trample left Admiral T&D (claiming that
the state of Pennsylvania was not big enough for all of his fami-
ly) and bought the Katanga from the Wilson Sisters... lock, stock
and barrel (a move applauded by the Wilson Sisters, who wanted to
get back to their first love, vaudeville). Hiring the designer
of the Admiral, Hashnish Shirka, (by luring him away from his
former company), Trample set out to build a better widget, the
Super Katanga. Not to be outdone, Admiral T&D hired good old Ray
Major and his Freundlich to do battle from their side of the
city.
And so you are faced with the totally implausible situation,
where lovers of the Katanga now support the Super Katanga, which
actually comes from the Admiral T&D Company, and the lovers of
the Admiral now gather around the Freundlich, even though it ac-
tually comes from the Katanga Company (by the way of the Wilson
Sisters, who, by the way, opened at the Atlantis Casino in early
March, to rave reviews). If you are still with me, I have a pro-
position for you, that concerns a certain bridge that is rumored
to be for sale...
EDITOR: I'm really sorry. I've read the article over and it stretches
logic too far.
AUTHOR: Gee, it is, after all, the August issue and maybe you can pass
it off as a spoof ?
EDITOR: As an Author, you know there must be an element of truth in
satire, or it fails.
AUTHOR: But Sir, the story is true, only the names have been changed to
protect the innocent.
EDITOR: Gimme a break. Do you think I was born yesterday? Why not
see if MAD Magazine is interested? Just go away and leave me
alone !
-----------------------------------------------------------------------
Book Review
Karsten Propper
In my last report I wrote that for this review, I would analyze the
book "Prison Ship". The book was so badly written that I never even
finished it. I've decided to do a different book instead. The book that
I will analyze is "The Seventh Swan" by Nicholas Stuart Gray.
The story is actually a continuation of a Grimm fairy tale. The
tale tells about how seven brothers are turned into swans by an evil
spell. The only way for them to be changed back is by their sister
weaving a special shirt for them. She runs out of cloth and the last
shirt lacks a sleeve. So at the end of the tale, one brother is left
with a right arm and a left swans wing. The book tells of his adventures
afterward.
The beginning of the book starts with a big dance. One specific boy
has a heavy plaid draped around his left arm. He overhears the whispers
about his wing, and runs out of the room crying and ashamed. This boy is
Alasdair.
You are then introduced to Ewen, his personal bodyguard. He is used
to the crying and moaning that comes from Alasdair, and has learned to
put up with it.
Fenella, his dance partner, is angry with Alasdair, and runs up to
his room. You are then introduced to a bard, who was also a magician. He
is a hunchback. He tells Fenella that the only way to save Alasdair is
to go to a special well and call on the Bocan, a repulsive monster who
owns the area.
The attempt bombs out, and Fenella is turned to a toad by the
Bocan. only way to release her from the spell was for Alasdair to
recognize her with- out being told specifically who she is. This signals
on a chain of events that end up with Fenella being half changed, having
a toad's head, but a woman's body.
To change her to a normal head, true love must be seen in her by
Alasdair or Ewen. Ewen finds it first, half converting her to a cross
between a regular head and a toad's. At the end of the story, true love
is found at last by Alasdair with the following remark.
"If you had ten heads, all hideous, you would still be my Fenella."
I really liked the book. It was well written, and has many humorous
parts in it. I liked the idea of continuing a fairy tale, which is one
of the reasons I bought it.
-----------------------------------------------------------------------
Message Board
by Barry Bowden
JANUARY 1990
S M T W T F S
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
22 22 23 24 25 26 27
28 29 30 31
January 1 New Year's Day
January 6 FAOUG
January 7 BIPUG
January 8 BACE
January 9 CCS (C64/C128)
January 13 Birmingham Apple Corps
January 14 BCCC
January 15 BEPCUG
January 16 CADUB
Martin Luther King's B-Day
January 18 CCS (Amiga)
January 23 CCS (C64/C128)
January 28 BCCC
BEPCUG CCS
Birmingham East PC Users Group Commodore Club South
Jefferson Sate Jr. College Springville Road Library
Ruby Carson Hall, Rm 114 2nd & 4th Tuesday (C64/C128)
3rd Friday, 7-9 PM 3rd Monday (Amiga)
Paula Ballard 251-6058 (after 5PM) 7:30-10 PM
Maurice Lovelady 684-6843
BCCC BIPUG
Birmingham Commodore Computer Club Birmingham IBM-PC Users Group
POB 59564 UAB Nutrition Science Blg
Birmingham, Al 35259 RM 535/541
UAB School of Education, Rm 153 1st Sunday (delayed one week
2nd and 4th Sundays, 2 PM if meeting is a holiday)
Rusty Hargett 854-5172 Marty Schulman 967-5883
BACE FAOUG
Birmingham Atari Computer First Alabama Osborne Users
Enthusiast Group
Vestavia Library, downstairs Homewood Library
2nd Monday, 7 PM 1st Saturday, 1PM
Benny Brown 822-5059 Ed Purquez 669-5200
CADUB Birmingham Apple Corps
CAD Users of Birmingham Homewood Library
Homewood Library 10 Office Park
3rd Tuesday, 6:30PM-8:30PM Mountain Brook
Bobby Benson 791-0426 2nd Saturday, 10:30 AM
Informal get together every
Saturday, Kopper Kettle,
Brookwood Village at 9 AM
J. Jenkins 823-1968
If you belong to or know of a user group that is not listed,
please let me know by sending E-Mail to me thru EzNet or on The Bus
System BBS. Please leave the group name and a contact person/phone
number.
-----------------------------------------------------------------------
Known BBS Numbers For The Birmingham Area
NAME NUMBER BAUD RATES SUPPORTED MODEM TYPE
*American BBS 674-1851 300, 1200, 2400
*Bus System BBS 595-1627 300, 1200, 2400
*Byte Me 979-2983 1200, 2400
Cat House 854-5907 300, 1200, 2400
*Channel 8250 744-8546 300, 1200, 2400, 9600 HST, V.32
*Crunchy Frog 956-1755 300, 1200, 2400
D3 Systems BBS 663-2759 300, 1200, 2400, 9600 HST, V.32
+Duck Pond BBS 822-0956 300, 1200, 2400, 9600 HST, V.32
Elite Fleet 853-1257 300, 1200, 2400
Gizmo's Atari BBS 854-0698 300, 1200, 2400
+I.S.A. BBS 995-6590 300, 1200, 2400
*Joker's Castle 744-6120 300, 1200, 2400
*Little Kingdom 823-9175 300, 1200, 2400
LZ Birmingham 870-7770 300, 1200, 2400
*Magnolia BBS 854-6407 300, 1200, 2400, 9600 HST
Penny Arcade 226-1841 300, 1200, 2400
ProSoft Systems BBS 853-8718 300, 1200, 2400
Role Player's Paradise 631-7654 300, 1200, 2400
Shadetree BBS 787-6723 300, 1200, 2400
Sperry BBS 853-6144 300, 1200, 2400, 9600 Hayes
*ST BBS 836-9311 300, 1200, 2400
The Connection Node 1 854-9074 1200, 2400
The Connection Node 2 854-2308 1200, 2400
The Islands BBS 870-7776 300, 1200, 2400
The Matrix Nodes 1-4 323-2016 300, 1200, 2400
The Matrix Node 5 251-2344 300, 1200, 2400, 9600 HST
The Outer Limits 969-3262 1200, 2400, 9600 HST
*The Professional's Board 856-0679 300, 1200, 2400
Twilight Zone 856-3783 300, 1200
Willie's DYM Node 1 979-1629 300, 1200, 2400
Willie's DYM Node 2 979-7739 300, 1200, 2400
Willie's RBBS 979-7743 300, 1200, 2400
Ziggy Unaxess 991-5696 300, 1200
Boards with a "*" before their name are members of our local network,
EzNet, and public messages left in the EzNet Conferences of any of these
boards will be echoed to all members.
Boards with a "+" before their name are members of FidoNet, an
international network that provides a variety of public forums as well
as private mail services all over the world.
-----------------------------------------------------------------------
EzNet Multiple Echo List
EzNet now supports multiple conference echoing but there are a few
things you should be aware of regarding private mail.
A. You have one 'address' for private mail. If you are registered for
private mail on Channel 8250 and someone sends you a private
message in the Writers conference from Crunchy Frog it will wind
up in the Writers conference on Channel 8250 as it should.
However, if you were registered for private mail on Magnolia and
someone sends you a private message in a conference that Magnolia
does not support (echo) then the message will wind up in the
twilight zone.
B. If you go by a handle on one BBS and your real name on another even
if the private message goes where it is supposed to, you will not
be able to read it because it is addressed to someone else as far
as PC Board is concerned. PC Board has no way of knowing that Red
Foxx and John Doe are the same person. No tickee, no washee.
Advice on sending private mail: If you don't know if the person you
are sending private mail to is registered for private mail then keep a
copy of the message in case you have to find an alternate route. EzNet
Central will delete your private, undelivered message and inform you
that the user you attempted to reach is not registered for private mail
on any EzNet Node.
This is a list of the current echoes that I am aware of. More are
in the making and will be posted in future issues. If you are a sysop
and are running an echo not listed for your board, please make us aware
of it so we may correct it next issue.
Eznet Program IBM Adult Scitech BTNWA
American BBS ........ * ..... ..... ..... ..... ..... ..
Bus System BBS ...... * ..... * ..... * ..... ..... * ..... * ..
Byte Me ............. * ..... * ..... * ..... * ..... ..... ..
Channel 8250 ........ * ..... * ..... * ..... ..... * ..... ..
Crunchy Frog ........ * ..... ..... * ..... * ..... ..... * ..
Joker's Castle ...... * ..... ..... ..... * ..... ..... ..
Little Kingdom ...... * ..... * ..... * ..... * ..... * ..... ..
Magnolia BBS ........ * ..... ..... ..... ..... ..... ..
Professional's Board * ..... ..... ..... ..... ..... ..
ST BBS .............. * ..... ..... ..... ..... ..... ..