Copy Link
Add to Bookmark
Report

ZIP Magazine Volume 4 Issue 3

eZine's profile picture
Published in 
ZIP Magazine
 · 1 year ago

 





Ú-----------------------------------------------------------¿
| É------------------» |
| ±±±±±±±±± Editors: | Volume 4 Issue 3 | |
| ±± Ron Alcorn | May 1991 | |
| ±± W.H. Lambdin È------------------¼ |
| ±± |
| ±±± Heres A Peek At What's Inside! |
| ±± ------------------------------- |
| ±± |
| ±± THE COMPLEAT COMPUTER DESK . 6 |
| ±±±±±±±±± |
| AMERICA ONLINE ............. 8 |
| ±±±±±±±±±± |
| ±± QWK-FILE FORMAT ............ 10 |
| ±± |
| ±± BATCH TUTORIAL #4 .......... 20 |
| ±± |
| ±± DARK AGES .................. 22 |
| ±± |
| ±± Q-DOS 3 .................... 24 |
| ±±±±±±±±±± |
| FROM THE COORDINATOR ....... 35 |
| ±±±±±±±±± |
| ±± ±± CONFERENCE PROFILES ........ 36 |
| ±± ±± |
| ±± ±± PASSWRD2.ZIP ............... 42 |
| ±±±±±±±±± |
| ±± |
| ±± Ú¿ Ú-¿ Ú-¿ Ú-¿ Ú-¿ -Â- ¿  Ú-¿ |
| ±± | | Ã-´ | ¿ Ã-´ / | |À¿| Ã- |
| ±± Á Á Á Á À-Ù Á Á À-Ù -Á- Á ÀÁ À-Ù |
| ----------------------------------- |
| "For Home MS-DOS users" |
| |
| /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ |
| \ "Be sure to read every section in all issues!" / |
| / We hope you enjoy this issue a lot. Thank you! \ |
| \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ |
| ------------------------------------------------------- |
| Up coming reviews... |
| |
| Cardinal 700 VGA Graphics Adapter, NEC CD-ROM drive, |
| and what ever we can gets our hands on. We need more |
| reviews and articles from you folks, so help us out! |
| |
| É-------------------------------------------------------» |
| | ¯ ¯ ¯ ¯ ZIP MAGAZINE DIRECT SUPPORT BBS'S ® ® ® ® | |
| Ç-------------------------------------------------------¶ |
| | ZIP BBS "Home Of ZIP Magazine" - HST 14.4K/V.32 9600 | |
| | Call (606) 878-9500 from 7 P.M. to 7 A.M. [EST] | |
| | Intelec Network BBS - 2 V-Series 9600 and 1 HST 9600 | |
| | Call (516) 867-4446, 4447, 4448 - ZIP Magazine Conf | |
| È-------------------------------------------------------¼ |
À-----------------------------------------------------------Ù





É-----------------------------------------------------------»
| |
| TABLE OF CONTENTS |
| |
| VOLUME 4 ISSUE 3 |
| |
Ì-----------------------------------------------------------¹
| |
| EDITORS CORNER .................................. Page 3 |
| FEEDBACK ........................................ Page 4 |
| NEWS ............................................ Page 5 |
| COMPRESSOR COMPARISON (REVISTED) ................ Page 6 |
| THE COMPLEAT COMPUTER DESK ...................... Page 6 |
| AMERICA ONLINE .................................. Page 8 |
| THE MYSTERIOUS QWK-FILE FORMAT .................. Page 10 |
| TOM'S TIDBITS ................................... Page 16 |
| IN-BASKET ....................................... Page 19 |
| BATCH TUTORIAL #4 ............................. Page 20 |
| DARK AGES ..................................... Page 22 |
| Q-DOS 3 ....................................... Page 24 |
| TWO POEMS BY INEZ HARRISON..................... Page 28 |
| BLUFF YOUR WAY IN COMPUTERS ................... Page 30 |
| FROM THE COORDINATOR .......................... Page 35 |
| CONFERENCE PROFILES ........................... Page 36 |
| IRAQ ATTACKS LOCAL BBS FOR REVENGE .............. Page 40 |
| EXTRA ROOM FOR SYSOPS ........................... Page 41 |
| PROGRAMERS CHALLENGE ............................ Page 42 |
| PASSWRD2.ZIP .................................... Page 42 |
| QUESTIONS AND ANSWERS ........................... Page 44 |
| BBS LIST ........................................ Page 45 |
| USERS GROUPS .................................... Page 48 |
| AD .............................................. Page 50 |
| |
È-----------------------------------------------------------¼





þþ EDITORS CORNER þþ

Several things are happening at ZIP Magazine.

The merger of ZIP Magazine, and the IN-Basket newsletter has
taken place.

I canceled my subscription to Compuserve.

Last week I signed on to America Online. America Online is a
service of Quantum computer Located in Vienna Virginia. If
you want to read more about America Online check out the
article later in the magazine.

I wish to applaud William R. Fink for sending a donation to
ZIP Magazine. It is much appreciated.

If anyone is looking for a good computer magazine. I
deffinately recommend for you to check into PC Sources. This
magazine is like a marriage of PC Magazine, and Computer
Shopper. PC Sources did it right. ;-)

ZIP Magazine has another advertiser. Marty Greenlief of Utah
is selling PC's and even a 40 MHZ 386 as the ZIP Magazine
special.

I have known Marty for about 10 months (Since I started this
Intelec Kick. ;-))




þþ FEEDBACK þþ

Thank you! Thanks to Mr. Lambdin for writing (Installing a
new Hard Disk) in volume 2 issue 6 of zip magazine. It was
exactly what I needed. No more Disk Manager for me! Robert
Towne

Mr. Lambdin; I read with interest your review of Quick Verse.
I am a Methodist minister, and Quick verse sounds perfect. I
was amused with some of your comments; especialy your
comments about the instalation routine. It can't be that bad.
James Roberts

I want to thank yoy for creating a great magazine. Your
articles have helped a lot in understanding computers. Your
technical articles are easy to understand even for the
someone who is not a technical person. Keep up the good work.
Michael D. Meehan

ZIP Magazine is the best electronic magazine in production.
Keep surprising us with the good quality articles. Brian
Dixon




þþ NEWS þþ

This is the first issue to combine ZIP Magazine with The
IN-Basket newsletter. Getting this ironed out has delayed
this issue. I hope that future releases will work smoothly.

Ron Alcorn doesn't have any articles in this issue of ZIP
Magazine. His computer is on the blink. So you will have to
wait until the next issue to read his reciews of the Cardinal
SVGA card, and his NEC CD-ROM drive.

If you split ZIP Magazine with ZS, delete the IN-Basket table
of contents from the lower portion of the TOM'S Tidbits file.
"ZIPSECT.8".




þþ COMPRESSOR COMPARISON (REVISITED) þþ
by W.H. Lambdin

I had some trouble from the article (Compressor Comparison) I
wrote in Volume 4 Issue 2 of ZIP Magazine. Numerous people
refused to accept that PKzip 1.10 would come in 6th from a
scope of 7 archive programs. Some people thought I used the
-ES option in the PKzip results.

I used the default compression routines in all 7 archive
programs. The default parameters in PKzip 1.10 is -EX to
minimise space, and PKzip really did come in low on the totem
pole.

I had several types of files in the mail directory. Text
files, .GIF, and .MAC graphic images, .ZIP files, and
executable files. I threw a selection of files together; in
order to achieve a fair comparison.

Most times; when a user wants to archive some files (s)he
compress all files in a directory. No one says. I will
compress these .TXT files with PAK, These .EXE files with
PKzip, These .GIF, and MAC files with ARJ.

I rank the archive programs and use the one that offers best
compression.


þþ THE COMPLEAT COMPUTER DESK! þþ
by Hank Hurteau

Much is written about what hardware and software you need to
get the most out of your computer. You can pick up any
computer magazine and read about "The Best" printers,
monitors, disk drives ect. You can read about the "Must Have"
software packages. Well, that's fine if you are in the market
for some of these add-ons. Never do you see articles about
all of the other stuff needed to have a "Compleat Computer
Desk"
. Until now! Keep in mind that these suggestions are
geared towards the addicted computer user so some of the
items would be deemed optional for the casual user.

DISKS: We all need extra disks around. Use these for backups
(what's that?), saving seldom used programs, and to put your
coffee cup on.

DISK SLEEVES: You will need to get extra sleeves for your
disks. A good rule of thumb is twice the number of disks you
have. It is a tightly guarded secret that the makers of disk
sleeves add a "secret" ingredient to the material used. If a
disk sleeve does not contain a disk for a period of time,
(varies according to manufacturer), it will vaporize. You
heard it here first!

DISK LABELS: If you reuse your disks several times, these
are a must. Try to remove the old one before adding a new
one.

PENS and PENCILS: A large supply of writing utensils is
another "must have". Start with a few dozen. Be sure to buy
the cheapest you can find as they don't last long. Once the
rest of the family discovers that there is a ready supply of
pens on your desk, they go fast. Don't count on them being
returned as they also contain the same ingredients as the
disk sleeves.

PAPER PADS: Needed to take notes. You can use your desk top
for this, but after a while your notes get jumbled if you use
this method too often.

TAPE and/or PUSH PINS: Useful for sticking up notes around
your desk. POST-IT pads also work well, but you usually make
notes on anything handy so the tape is necessary. One of the
things you will want to post in an conspicuous spot is you
work phone number. That way you won't have to get out of
your chair to call in sick. NOTE: Disk labels and write
protect tabs can be used as a substitute.

COASTERS: Once your desk gets too sticky from the countless
bottles of soft drinks, lemonade, ect, you may want to think
about getting some coasters. But, you needn't go out and buy
any. Look around your desk and you will find many very good
substitutes. As mentioned above, disks work well. Other
suggestions are software manuals, pads of paper, and my
favorite, a mouse pad.

PAPER TOWELS: Used to clean up spilled coffee ect.

WET TOWELETTES: Used when a paper towel wasn't used right
away and spill becomes hardened. (This is optional)

ASH TRAYS: If you are a smoker, these are a must! Your
spouse may get angry if you continue to put out your
cigarettes on the floor.

WASTEPAPER BASKET: Used for old COKE cans, unwanted
printouts, peanut shells, ect. Besides, these can give the
impression that you do try to keep a clean desk!!

PICTURES OF THE KIDS: Try and get current pictures of your
kids and put them where you will see them often. This way,
if for some reason you turn around and see some children you
can instantly tell whether or not they are yours. It may also
be nice if you had one of your spouse so you readily
recognize him/her.

REAR VIEW MIRROR: I have found this very useful to see what
is going on behind you. Mount this on the side of you monitor
and the pictures mentioned above may not be needed. No need
to clutter your desk with unnecessary extras!

SCREWDRIVERS: You will need a few small screwdrivers to try
and make those little repairs. As a rule, 50% of the time you
will do no serious damage. Keep in mind that like disk
sleeves, screwdrivers tend to vaporize, so keep a few extra.

FLASH LIGHT: The only way to find those little screws you
dropped while doing the repairs noted above. By the way,
these screws come in two types. The first is the type that
multiplies. That means that you will end up with more than
you started. If you have extra when you put everything back
together, don't worry. Just put them in a drawer and you will
plenty for your next "repair". The second type is the
vaporizing variety. These are the ones that disappear when
you aren't looking. Remember that you will never have both of
these in one machine.

DICTIONARY: This is useful for many things. You don't want
to sound illiterate while leaving messages on your local BBS.
Also a good substitute for a coaster.

THERMOMETER: If you can install an INDOOR/OUTDOOR thermometer
close to your desk, you will have a pretty good idea of what
kind of day you are missing. So, if anyone wants to talk
about the weather, you will at least have an idea of what
kind of day it was.

COOLER: If you don't have a refrigerator within easy reach,
you might want to consider having a cooler for your liquid
refreshments. You can also store sandwiches and other snacks
if it is large enough. You may want to hire one of the kids
to keep it stocked for you.

Well, these are just some general guidelines. This should
significantly reduce the time wasted by getting out of your
chair. You can customize YOUR desk to suit you habits.

Happy Computing!!


þþ AMERICA ONLINE þþ
by W.H. Lambdin

If anyone is looking for a good/easy online service; check
out America On-line.

If you should be interested in subscribing to America
On-line, I have enclosed two telephone numbers for your
convenience

(703) 448-8700
(703) 893-6288

If you call either number above, the answering machine will
keep talking about PC-Link. Don't hang up. PC-Link, and
America On-line are both produced by the same company.
Quantum computers in Vienna Virginaia.

America On-line is only $9.95 a month with three hours of
connect time. If you exceed 3 hours of connect time. America
On-line charges $4 for the fourth hour and each additional
hour of connect time.

I have uploaded all back issues of ZIP Magazine to America
On-line, and they should be placed in a file area soon for
downloads. I will upload any future release of ZIP Magazine
there for wide distribution.

If you call America On-Line and have a question for me; send
some mail to "ST addict" (Star Trek of course ;-)).

America On-Line is very simple to use. It runs under GEOS for
the PC. You don't have to use GEOS PC for the operating
system. America On-line comes with a run-time engine.

America On-line is simple to use. 90% of America On-line's
services can be drives by clicking the mouse on an Icon.

America On-line has a vast array of items to keep you
interested. Enclyclopedia, newspapers, magazines, Electronic
mall, real time conferences. online games. the list is almost
endless.

America Online is the new kid in the neighborhood, but
growing fast with already over 5000 menbers, and more than
10,000 files.

I would recommend for anyone to check into America On-line.
Finaly an on-line service that is easy to use. There are no
complicated commands to remember.

I only have one small complaint about America On-Line. If you
capture newspaper articles in a log file. They use soft
Carriage returns. This means that you willl have to load the
log file into a text editor and block up the paragraphs
before you can read them.



þþ THE MYSTERIOUS QWK-FILE FORMAT þþ
by
Jeffery Foy


It would be safe to assume that if you're reading this
article, you use or have used a QWK-compatible offline mail
reader. The QWK format has emerged as the format of choice
due to the relatively small size of QWK mail packets as
compared to an equivalent ASCII text file.

As most users of offline mail readers know, the QWK format
was designed by Mark Herring (Sparky) of Sparkware. While Mr.
Herring did design the format, he only gave very sketchy
details as to the specifics of the format. This is quite
understandable as he is a very busy person. That is the
reason why I'm writing this article.

In it's most basic form, a QWK file is simply a compressed
file. In almost all cases, the QWK file has been compressed
with PKZIP from PKWARE. With most mail doors, you can usually
choose your favorite archiver so your QWK file may not be in
PKZIP format.

Within the compressed QWK file are quite a number of other
component files. We'll start with the one called CONTROL.DAT
since it is the easiest to describe. It is an ASCII text file
so if you have one handy, you can follow along.

Generic BBS ; Line # 1
Seattle, WA ; Line # 2
206-555-1212 ; Line # 3
Joe Sysop, Sysop ; Line # 4
00000,GENBBS ; Line # 5
01-01-1991,00:00:00 ; Line # 6
MARY USER ; Line # 7
MENU ; Line # 8
0 ; Line # 9
0 ; Line #10
254 ; Line #11
0 ; Line #12
Main Conf ; Line #13
... ; Line # x
254 ; Line # x
Last Conf ; Line # x
HELLO
NEWS
GOODBYE

Line # 1 - This is the BBS name where you got your mail
packet.
Line # 2 - This is the city and state where the BBS is
located.
Line # 3 - This is the BBS phone number.
Line # 4 - This is the sysop's name.
Line # 5 - This line contains first the serial number of the
mail door followed by the BBS ID. Note the BBS ID
as it will be used later in this article.
Line # 6 - This is the time and date of the packet.
Line # 7 - This is the uppercase name of the user for which
this packet was prepared.
Line # 8 - This line contains the name of the menu file for
those who use the Qmail reader/door. Almost all
other mail doors leave this line blank.
Line # 9 - No one seems to know what this line is meant for.
Line #10 - No one seems to know what this line is meant for.
(Note: Both of these ALWAYS seem to be 0)
Line #11 - This line is the maximum number of conferences
MINUS 1.
Line #12 - This line is the first conference's number. It is
usually 0 but not always.
Line #13 - This line is the name of the first conference. It
is 10 characters or less.

Lines 12 and 13 are repeated for as many conferences as
listed in line 11.

Anything you see after the last conference name can be
ignored as that information isn't usually provided by mail
doors. One exception to this is the Markmail door.

Now we'll talk about the message file itself. If you haven't
guess by now, it is the MESSAGES.DAT file. This is, quite
obviously, the largest file in the .QWK packet.

MESSAGES.DAT is organized very specifically into 128-byte
records. The first record is the Sparkware copyright notice.
The rest of the record after the copyright notice is filled
with blanks (spaces). To maintain compatibility with Sparky's
Qmail Door, all mail doors reproduce the copyright notice
exactly.

Following the first record begins the "meat" of the message
file. Each message included in the file consists of a header
followed directly by the message text itself. First we will
describe the header:

Header Field
Position Length Description
-------- ------ ----------------------------------------
1 1 Message status byte
' ' = public message which hasn't been
read
'-' = public and already read
'*' = private message
'~' = comment to sysop which hasn't
been read by the sysop
'`' = comment to sysop which HAS been
read by the sysop
'%' = password protected message that
hasn't been read (protected by
sender of message)
'^' = password protected message that
HAS been read (protected by
sender of message)
'!' = password protected message that
hasn't been read (protected by
group password)
'#' = password protected message that
HAS been read (protected by
group password)
'$' = password protected message that
is addressed to ALL (protected
by group password)
2 7 Message number coded in ASCII
9 8 Date coded in ASCII (MM-DD-YY)
17 5 Time coded in ASCII (HH:MM) 24 hour
format
22 25 Uppercase name of person message is TO
47 25 Uppercase name of person message is FROM
72 25 Subject of message
97 12 Message password. Usually not anything
but spaces (to denote no password)
109 8 Message # this message refers to (coded
in ASCII)
117 6 Number of 128-byte chunks in the actual
message (includes header and is coded in
ASCII)
123 1 Determines whethere a message is live
(active) or killed. 90% of the time you
won't see a killed message in a packet.
'a' = Message is active/alive (0xE1)
'b' = Message is killed/dead (0xE2)
124 1 Least significant byte of conference
number.
125 1 Most significant byte of conference
number. NOTE: This isn't in the original
.QWK format but has become the standard
due to conference numbers greater than
255. In the original format, this byte
was space-filled.
126 3 Filler bytes for future expansion.
Space-filled and usually ignored.

Following the header record comes the message text itself.
The message text is simply the body of the message. To save
space, the return/linefeed combination is translated to the
pi character 'c' (0xE3). Note that the last line of the
message is padded with spaces to fill out the 128-byte
record.

Now we'll talk about the *.NDX files that are included in the
packet. Each .NDX file is formatted into records of 5-bytes
each. The bytes in each record are formatted thusly:

Start Field
Byte Length Description
---- ------ --------------------------------------------
1 4 This is a floating point number in the MSBIN
format. This number is the record number of
the message header in MESSAGES.DAT that
corresponds to this message.

5 1 This byte is the conferece number of this
message. This byte can (and should) be
ignored as it is duplicated in the message
header in MESSAGES.DAT. This is especially
important for conferences numbered higher
than 255.

Let's stray just a moment to talk about the MSBIN floating
point format. This is the format used by the older Microsoft
Basic compilers and interpreters. Most compiler manufacturers
have switched to the more efficient IEEE floating point
format. Therefore, we must have a method of converting to and
from MSBIN format. Included at the end of this article are
two routines in C that accomplish this quite easily.

Ok, let's talk about the format of the .REP (reply) packet.
Like the .QWK packet it is usually compressed. Inside the
compressed archive is a file whose extension is .MSG. The
filename itself is the same as line #5 of CONTROL.DAT. This
is the BBSID. So, for example, if the BBSID is GENERIC, the
complete filename in the .REP packet would be GENERIC.MSG.

The format of the .MSG file is almost exactly the same as the
MESSAGES.DAT file with three differences:

1). In the first record, rather than a copyright notice, the
first eight bytes are the BBSID as described above. The
rest of the record is filled with spaces.

2). In the message header, rather than the ASCII-coded
message number, we have the ASCII-coded conference number

3). Also in the message header, the conference number field
(byte offset 124 & 125) may be filled with spaces *OR*
the conference number.

In recent months a new file, DOOR.ID, has been added to the
.QWK packet. I know very little about it but will attempt to
explain it as best as I can.

DOOR.ID seems to be a method for individual doors to let the
mail reader know how to add and drop conferences. It is a
good idea and I hope more doors and readers can be made to
cooperate with it.

Usually there are only five lines in this file. Here is a
sample from one of my recent .QWK packets:

DOOR = TomCat! Line #1
VERSION = 2.9 Line #2
SYSTEM = Wildcat! 2.x Line #3
CONTROLNAME = TOMCAT Line #4
CONTROLTYPE = ADD Line #5
CONTROLTYPE = DROP Line #6

Line #1 - This is the mail door's name.
Line #2 - This is the mail door's version number.
Line #3 - This is the BBS software used and version number.
Line #4 - This is the control name (TO:) where to send
requests for conference changes.
Line #5 - This is the command the door expects to see to add
a conference to the user's current list.
Line #6 - This is the command the door expects to see to drop
a conference from the user's current list.

Here are the routines I use to convert to and from the MSBIN
format. You may use them as you see fit - they are not
copyrighted by me.

/*** MSBIN conversion routines ***/

union Converter
{
unsigned char uc[10];
unsigned int ui[5];
unsigned long ul[2];
float f[2];
double d[1];
}

/* MSBINToIEEE - Converts an MSBIN floating point number */
/* to IEEE floating point format */
/* */
/* Input: f - floating point number in MSBIN format */
/* Output: Same number in IEEE format */

float MSBINToIEEE(float f)
{
union Converter t;
int sign, exp; /* sign and exponent */

t.f[0] = f;

/* extract the sign & move exponent bias from 0x81 to 0x7f */

sign = t.uc[2] / 0x80;
exp = (t.uc[3] - 0x81 + 0x7f) & 0xff;

/* reassemble them in IEEE 4 byte real number format */

t.ui[1] = (t.ui[1] & 0x7f) | (exp << 7) | (sign << 15);
return t.f[0];
} /* End of MSBINToIEEE */


/* IEEEToMSBIN - Converts an IEEE floating point number */
/* to MSBIN floating point format */
/* */
/* Input: f - floating point number in IEEE format */
/* Output: Same number in MSBIN format */

float IEEEToMSBIN(float f)
{
union Converter t;
int sign, exp; /* sign and exponent */

t.f[0] = f;

/* extract sign & change exponent bias from 0x7f to 0x81 */

sign = t.uc[3] / 0x80;
exp = ((t.ui[1] >> 7) - 0x7f + 0x81) & 0xff;

/* reassemble them in MSBIN format */

t.ui[1] = (t.ui[1] & 0x7f) | (sign << 7) | (exp << 8);
return t.f[0];
} /* End of IEEEToMSBIN */


Well, that is all there is to it! I hope this article has
shed some light on the so-called "mysterious" .QWK format.


Jeffery Foy, April 1991




þþ TOM'S TIDBITS þþ
May 1991
----------------------------

Its baseball season so I thought that I would share a couple
of bats with you. No, not the kind you swing but the kind
you use on your computer to help you do things quickly. I
am referring to "batch" files. A batch file is an ASCII file
that you can make with most any word processor. Simple batch
files contain DOS commands exactly as you would type them on
the keyboard one at a time. There are also some additional
commands that help control the flow of the file. All batch
files have the DOS filename extension ".bat."

SWAP IN A PINCH HITTER

Two important files to your computer are "config.sys" and
"autoexec.bat." Sometimes it may be nice to change them a
little bit to accommodate a special program. I usually run
Software Carousel to manage all of my memory, but when I use
Ventura Publisher, I like to change my config.sys to activate
some EMS memory and omit Carousel entirely. This requires a
change in both "config.sys" and in "autoexec.bat". I could
just edit these files each time I need to change them but
that gets a little laborious so I use a little "bat" file to
do this for me automatically. Here is how it works.

1. Make an additional version of both autoexec.bat and
config.sys. Call them autoexec.xxx and config.xxx. The
file with the ".xxx" extension are the files that you
want to change to. Both files should be in the root
directory of your hard disk.

2. When you type "swap" and press enter, the batch file
"swap.bat" switches the files. Your current
"autoexec.bat" becomes "autoexec.xxx" and vice-versa.
Your current "config.sys" becomes "config.xxx" and
vice-versa.

3. The "swap.bat" file accomplishes its task by playing a
little shell game with your files. It changes
"autoexec.bat" to a temporary file, "autoexec.swp".
Then it changes "autoexec.xxx" to "autoexec.bat".
Finally, it changes "autoexec.swp" to "autoexec.xxx."
The same thing is done for "config.sys." To top it all
off, the "swap.bat" file end with a cold re-boot of your
system so that the changes in "config.sys" are activated.

4. Study the file "swap.bat" and see how simple dos
commands are used in a batch file to accomplish an
annoying task. Modify it as you wish.




BASES ARE LOADED

Have you ever wondered if your hard disk really works to the
bitter end. I have seen rare cases where a hard disk will
work fine until it get full to a certain point, then chaos
strikes. When this happens, it is usually due to an improper
original setup. I remember once when I accidentally
formatted a 70 meg. Miniscribe using the wrong AT drive type
number in the setup program. It worked fine for several
months and then when I least expected it, everything went
bonkers. New program files began to overwrite the F.A.T.
Total format failure followed close behind. When I got it
fixed, I was a little nervous and decided to load all the
bases. I decided to fill the hard disk to its maximum
capacity. Have you ever tried to come up with 70 megabytes
of junk to use as filler. Here is how I did it. I wrote a
batch file called "fillhd.bat." It uses batch "parameters"
and the "shift" command to create sub-directories on your
hard disk and fill them with what ever you have laying
around. To use it, do the following.

1. Put the file "fillhd.bat" onto your hard disk somewhere
in your active path.

2. Change to any sub-directory that you possess that
happens to be rather large. The bigger the better. I
used my Word Perfect 5.1 directory because it was 2
megabytes in sizes.

3. Type "fillhd 1 2 3 4 5 6 7 8 9" and press enter. Your
disk should start whirring and clicking and filling up.
If it stops and is still not full, type "fillhd 10 11 12
13 14 15 16 17 18"
and press enter. The process will
continue. Soon your disk will be completely full!

** WARNING **

If you happen to have sub-directories that are named 1,
2, 3, etc do not use this procedure!

4. How does it work? The "fillhd.bat" file looks at the
first parameter in the command line and creates a
sub-directory by that name. Numbers are used as
parameters for convenience. It then copies all the files
from the default sub-directory into the new sub-directory
that was just created. The word "shift" in the batch
file causes the next parameter in the command line to be
used while the process is repeated. After all parameters
are used, the processing stops. Study the "fillhd.bat"
file. Maybe you can find other uses for "parameters" and
the "shift" command.




THROW'EM A CHANGE UP

Sometimes it is nice to have the computer do things
different every time you turn it on. For example, I collect
electronic clocks, lovely representations of a clock
displayed on the screen. All I have to do to see one is to
type the work "clok" and ZING! there it is on the screen.
The trouble is, I have so many of these things that I can't
remember their names and I don't like to see the same clock
twice in a row. To solve this little problem, I threw a
CHANGE UP. I wrote a little batch file called "clok.bat"
that automatically picks a different clock every time I type
the word "clok." I have included this batch file and a couple
of clocks from my collection so you can see how it works.
(Sorry, the clocks only work with EGA or VGA monitors.) If
you study the batch file "clok.bat" you can learn a technique
that you can use for many other things. In a nutshell, here
is how it works.

1. I have a dummy file in the directory called "numX" where
"X" is a number from 1 to whatever.

2. The batch file looks for files on the disk by using the
"if exist" command.

3. If a certain number exists in the "X" position, then the
associated task is performed and the "numX" file is
renamed. In this case, the task is loading a clock
program.

4. By lengthening the "clok.bat" file, any number of clocks
can be called without ever having two appear in a row.
When you get to the last clock, the process loops back to
the beginning.

5. This is not the most efficient way to accomplish this
task but it is fairly simple, easy to understand, and it
works.

If you have any clever batch files that you would like to
share with our readers, send them to me at:

Tom's Tidbits
Box 188
Battle Ground, WA 986047



Ò
-Ò- Ò Ò Ò-- | Ò¿ Ò
| Ç--¶ Ç- | || |
Ð Ð Ð Ð-- | |À-¿|
Ð | ||
Ð ÀÐ
||-|-|-|-|-|Ú-Ù Ò-· Ö--· Ö--· Ò Ú Ò-- -Ò-
|-|-|-|-|-|-| Ç-з Ç--¶ Ó--· Ç-Á¿ Ç- |
Ó-----------Ù Ð--Ð Ð Ð Ó--½ Ð À Ð-- Ð

THE ELECTRONIC NEWSMAGAZINE OF THE INTELEC (tm) NETWORK
Now Published and Distributed as Part of ZIP Magazine

THE IN BASKET and INTELEC are Trademarks of
Intelec Business Network Inc. All Rights Reserved.

BATCH TUTORIAL ..................................... Page 20
DARK AGES .......................................... Page 22
Q-DOS 3 ............................................ Page 24
TWO POEMS BY INEZ HARRISON ......................... Page 28
HOW TO BLUFF YOUR WAY IN COMPUTERS ................. Page 30
FROM THE COORDINATOR ............................... Page 35
CONFERENCE PROFILES ................................ Page 36
CHECK IN-9105.ZIP FOR NETWORK INFORMATION




þþ BATCH TUTORIAL #4 þþ
by Cody Gibson

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

Hello guys and gals. It's time for our fourth installment in
the Batch Tutorial. As you should recall from the last
installment, "ECHO" controls the display of the individual
commands as they're being executed from a batch file. "ECHO
ON"
causes all lines to be displayed before they're executed.
"ECHO OFF" turns off this display. Also, "ECHO string" causes
"string" to be displayed on your screen during the execution
of the batch file. We also learned that the at-sign (DOS 3.3
and up only) when put in front of *any* command in a batch
file, causes that command line to NOT be displayed when it's
executed. In this installment we'll learn about the PAUSE,
GOTO, and IF commands.

When DOS executes the PAUSE command, it will temporarily
suspend the execution of a batch file and display "Strike
any key when ready..."
. At this point you have two options.
One is to strike any key which will cause the batch file to
resume. Or you can actually completely abort the batch file
by pressing Ctrl-C. The PAUSE command will accept anything
else you enter after the command. If you have echoing on,
it'll just display the entire line, execute the PAUSE command
and ignore the rest of the line. This can be very useful for
debugging a batch file. You can insert PAUSEs and see if you
get to them and whether or not things worked properly up to
that point. You can also use it to pause when necessary to
change things, like inserting a diskette.

GOTO will literally cause the execution of your batch file to
continue by jumping to a label within your batch file. For
example:

-------------------------------------------------------------
GOTO MYLABEL
commandx
:MYLABEL
commandy
-------------------------------------------------------------

will cause "commandx" to be completely skipped, and
execution will continue with "commandy". Now the use for
such a thing does not become apparent until we get to the
intermediate commands in which the GOTO can be used to an
advantage.

Notice how the label starts with a ":"? This is a special
indica- tor to DOS that the line is a label instead of a
command. The ":" may start anywhere on the line, just so long
as it's the first non-white space character. You may have as
many white space characters between the ":" and the label as
you like. You may also choose any name you like for the
label. One last note, you may also add text after the label.
Text entered there can help document what the label is used
for.

Now we get into the intermediate commands, the first of
which is the "IF" command. IF can be used to check for the
existence of a file, compare two strings together, or it can
check the "Errorlevel" returned by the last program run.

To check for the existence of a file, you use "IF EXIST
filename.ext commandx"
. If "filename.ext" exists, DOS would
execute "commandx", which can be any valid DOS command,
including any of the special Batch file commands, even
another IF command. On the other hand, if "filename.ext" did
not exist, DOS would continue execution of the batch file
with the next line, completely ignoring anything else on the
IF line. DOS will accept complete path specifications in
"filename.ext" but does not require it. Also, DOS will NOT
traverse the Path setting when looking for the file.

Now, by combining this feature with the GOTO, you can do
something like this:

-------------------------------------------------------------
*ECHO OFF (note: replace "*" with an at-sign)
::Export the BBS mail into one outgoing mail packet
CALL EXPORT
::Check to see if the export successfully created a mail packet
IF EXIST E:\GT\PRIVATE\BATCHIN.RLY GOTO CALLHUB
::Oops, something went wrong. We don't have a mail packet!
ECHO There is no mail packet to send. Something's wrong!!!
GOTO END
::There is a mail packet, call the hub and send it.
:CALLHUB
PCPLUS /FHUBWA
ECHO Mail successfully transferred.
:END

The above batch file starts by turning off command echo.
Then it calls another batch file "EXPORT.BAT". Then it
checks for the existence of "BATCHIN.RLY". If it finds it,
it will run Procomm+ with a parameter to run a script which
automatically dials the hub, transfers the mail, and quits
back to DOS. If it does not find "BATCHIN.RLY", it displays
an error message and quits the batch file.

Look for the next Batch Tutorial in the next Intelec
newsletter where we'll continue with the rest of the IF
command capabilities. If you would like a transcript of all
the Batch Tutorials, call The Real Batchin' Board at
206-391-2330.

-------------------------------------------------------------

Text is copyright 1990 by Cody Gibson. All rights reserved.


þþ DARK AGES þþ

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

DARK AGES: VOLUME 1
by Michael Brunk

Dark Ages: Volume 1 - "The Prince of Destiny"
Version 1.0

Released By: Apogee Software Productions
Registration Fee: $15
Machine Requirements: 80286/80386 recommended, EGA/VGA
required 400k free RAM,
Adlib/Soundblaster card optional

In Dark Ages Volume 1, you the player are a Prince and heir
to a great kingdom. Captured as a child and banished to be
raised by peasants you are now a skilled warrior ready to
return and free your kingdom from the clutches of Garth the
Evil Wizard. You must navigate your way through 10 levels of
adventure battling Garth's evil assortment of vermin at every
turn. Although your initial encounters seem easy the farther
you go the tougher the opponents you face will be! To
survive you can leap over opponents and fire magical bolts of
energy. As you progress you will be able to throw more bolts
at one time and perhaps even find more powerful weapons
hinted at in the instructions. When you begin your player
is in the best of health, but this will be reduced each time
you are hit by an enemy. Your health can be restored during
game play by collecting gold 'coins' or by finding certain
magical objects. On each level of the game there is a 'wise
man' and a specific magic object. To complete the level you
must find the object and take it to the wise man, who will
then open a portal somewhere on the level that will take you
to the next screen. You can save or restore a game at any
time during play and you should make use of this feature!

Dark Ages Volume 1 is a yet another offering from Apogee
Software Productions, the publishing company that handles
The Kingdom of Kroz, The Monuments of Mars, Pharaoh's Tomb
and Commander Keen series of computer games. Apogee Software
seems to be a company that uses shareware marketing in a way
that benefits both the company *and* the BBSing community.
Each of their game series is comprised of multiple
installments, each of which is a complete game in itself. The
first volume of each series is released totally uncrippled as
shareware with the additional volumes available for a
reasonable fee. Each volume of Dark Ages is $15 or you may
order the entire trilogy for $30.

The game presents itself as a professional quality arcade
game with good graphics and sound effects. Indeed, if one
has a Soundblaster or Adlib card you can even treat yourself
to a complete soundtrack of eight unique songs. Without a
soundcard you are limited to simple but effective sound
effects using the PC's built-in speaker. All game control is
through the keyboard. Movement is via the arrow keys with
configurable 'shoot' and 'jump' keys. The built-in
configuration module also allows you to select the skill
level at which the game will run. Save and restore is
supported (and recommended!) and the game also maintains a
'Top Ten' scoreboard. All of these features, plus
instructions, background and ordering information, are
handily available from within the game. The documentation
recommends an 80286 or 80386 computer but does not
specifically state that it will NOT run on a turbo XT class
computer. EGA or VGA is required. This reviewer used a 12MhZ
80286 clone with an EGA card. With this hardware the game
played smoothly with rapid animation and next to no
perceptible delay during any part of the game.

Overall, I found this game to be one of the highest quality
shareware releases I have come upon. Although I do not
normally like arcade-type games I found this one easy to play
yet challenging enough to be completely addicting. After
playing for quite some time I STILL haven't gone past the
sixth screen and am rushing typing this review so I can get
back at it! Dark Ages Volume 1 is available on many BBS's as
#1DARK.ZIP, give it a try if you haven't already!

Michael Brunk
CyberSpace BBS
PCRelay Node ID CSPACE

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>

ADDENDUM: Procurement of another EGA card has allowed me to
confirm that while the documentation for Dark Ages
recommends an 80286 or 80386 based machine the game will run
acceptably on my 10MhZ Turbo XT. It is noticeably slower but
still enjoyable and indeed, easier for people like me lacking
in the manual dexterity required to actually complete one of
these games!

þþ Q-DOS 3 þþ
by Bob Walthers

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

Q-DOS 3 KEEPS BLAZING SPEED, ADDS USERS' WISH LIST OF
FEATURES

I grew up with Q-DOS. It was my first and favorite File
Management/DOS Shell program. It was fast, easy to use,
versatile and featured fast hot-key access to a wide array
of file management functions.

Born in 1986, just about a year newer than the original
Q-DOS, Q-DOS II was long due for an overhaul. And Gazelle
Systems, the program's creator, knew it but proceeded with
all the haste of the tortoise in his hare-racing event. The
list of user suggestions grew longer and longer. Q-DOS'
fanatical fans wanted mouse support, EGA/VGA support, a
built-in editor that supported files larger than 60Kbytes
(and please, how about some color?!?!), side-by-side display
of files from two different directories, a Find command that
searches all drives, and more.

We Q-DOS users used to be contented campers. We knew we had
the fastest file manager/shell around. But other programs
began introducing new features. Graphical display standards
changed. Mouse usage increased. Added features with glitz and
glitter began to outshine our humble Q-DOS.

Oh, we knew we still had the fastest around. Q-DOS II could
find any file by name or wildcard across one or multiple
drives in, literally, seconds! With one hot-keystroke, we
could Jump right to the file in its subdirectory. And with
another, we could instantly view the file if it were text. Or
with a couple of quick keystrokes, we could run it (if
executable) from a DOS prompt line. This series of keystrokes
was Q-DOS II's equivalent of the gunfight at the O.K. corral.
And Q-DOS beat all comers, hands down.

But we wanted it all. And it took Gazelle Systems some five
years to do it. But do it they did. Q-DOS 3 is here. And it
has everything we always wanted. Best of all, there are
virtually no sacrifices. It's still faster than a screaming
bullet. But now it can leap tall buildings at a single bound.

The long awaited mouse support is present. It's intuitively
smart as well. Double-click on a file and, if it's text, it
pops up in Q-DOS's smart new viewer (with built-in search,
HEX/ASCII, auto scroll with speed selection, and other
goodies). If it's an EXE, COM or BAT file, it runs as if
you'd typed it in on the command line.

There's side-by-side display of two subdirectories if you
want it. Or side-by-side display of the directory map and the
files in a subdirectory. Or even an over-under display of two
different directory maps from different drives. You select
what you want and go configure.

Q-DOS now keeps a record of the previous 15 DOS commands
issued from the command line. Click on or arrow down to the
one you want and go. The old Q-DOS II gobbled up a healthy
chunk of RAM and didn't free it to run programs. So there
were many programs that just plain wouldn't run from Q-DOS.
Version 3 retains only 3K of RAM when running a program from
inside Q-DOS, so everything goes.

You want to run Q-DOS from a network? It now runs on
Novell(tm) and all DOS-compatible networks. You want EGA/VGA
support? Q-DOS supports the 43/50 line display mode and even
132 columns if you want it. You want Unerase? Q-DOS has it.
Added directory functions? Q-DOS now lets you prune, graft,
rename and erase directories from the Directory Map.

Remember that old monochromatic editor that burped on files
over 60K? Meet G-Edit, Gazelle's powerful new editor.
Gazelle claims this one alone is worth the price of
admission. I won't scoff at their claim. The new editor is,
of course, fast. But it's also slick with well thought-out
features. G-Edit allows up to five files (1 meg total) to be
edited simultaneously in movable, stackable, resizable,
zoomable overlapping windows. Custom colors, Hex or ASCII
editing, file tagging of up to five files for simultaneous
editing. G-Edit can even automatically save your entire edit
session, bringing up the same configuration of files so you
can resume editing as though you'd never exited. You can also
jump instantly to any line, character, or position in any
file, regardless of file size. And begin file editing even
before the entire file has been loaded. Ingenious menus are
available by pressing either Ctrl or Alt and then pressing
the highlighted letter of the command. This is one slick
editor.

Back to Q-DOS 3, its new features include Copy with Rename,
which lets you copy files and then rename them in the same
process. I like this idea a lot. The same principle applies
with the Wild Card Rename. You can not only Copy files but
you can also Copy Directories with Subdirectories intact. You
can define the order of the commands on the Command Line.
Launch an application with a single keystroke. Rename
directories as well as files. Choose from hundreds of
different color combinations. And configure all these great
new features easily, making Q-DOS 3 your own unique
combination of file manipulation magic.

Gazelle didn't forget to keep the best of the past either.
File Find is still the blazer it was in earlier versions.
Now you get a choice of searching the drive you're on or all
drives. You still get to Jump right to the file in its
subdirectory. But now you can run it with either a quick
click or a hot-keystroke.

Gazelle even throws in a wonderful utility that can be run
from Q-DOS or on its own, from the command line: DOS RAM
Memory display. This memory map program reminds me of a
mini-Manifest (the program that comes with Quarterdeck's QEMM
and DesqView). Designed more for the experienced user who
want to know precisely how system memory is allocated,
QDMEMMAP provides four different memory displays: 1) a
summary of conventional, extended, and expanded memory use;
2) a list of all memory block allocations; 3) a list of
memory usage by each resident program; and 4) a list of
device drivers currently in memory.

What's wrong with this picture? Well, to be perfectly
honest, I haven't found much of anything yet. Q-DOS 3 meets
all my fondest expectations and then some. Oh, I could
nit-pick the fact that the program requires (and they mean
it!) you to place an environmental variable in your
autoexec.bat: SET QDOS=D:\QDOS. But that's a small
inconvenience. It doesn't have a text search function. But I
can run lots of other programs from Q-DOS that do. Did I
mention that Q-DOS 3 is Windows 3.0 compliant (whatever
"compliance" is)? Did I mention you get a 60-day MONEY BACK
guarantee? Did I mention unlimited TOLL-FREE support? I
probably should.

I get no remuneration from Gazelle Systems. I am not in their
employ. I'm just a former happy user of Q-DOS II. Now an
ecstatic user of Q-DOS 3.

Q-DOS 3 is available for $99.95 from Gazelle Systems, 42
North University Avenue, Provo, Utah 84601. Existing users
can upgrade for $35. A 1-8 user network upgrade is available
for $90.

Gazelle's toll-free Orders Only Hotline is 1-800-825-3116.
Their customer service number is 1-800-233-0383. For this
release orders may be faxed to (801) 373-6933. Gazelle
accepts MasterCard, VISA and American Express plastic.

# # # # # # # # # # # # # # # # # # # # #

Copyright 1991, Bob Walthers, All Rights Reserved.




þþ POETRY BY INEZ HARRISON þþ

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

OLD MAN

Old man on the train, in everybodies way;
You're out all alone, on such a dreadful day.

Clothes hang on the body, that was and used to be;
Bold and proud, you flaunt your poverty.

Where are the children, you're in this way for;
Where are the friends, who borrowed 'til no more.

Old man on the train, frightened of the ride;
What are you thinking, what are you feeling inside.

You seem to get in the way, wherever you go;
No one wants to bother, you mumble and stumble so.

Old man on the train, no one wants to bother;
I wonder if one day, instead it'll be my father!!

By: Inez Harrison
Poetry Conference Host




ALL THAT I AM

Sometimes, you want more than I'm capable of giving
You feel I should, because you would
I'm giving all that I have
So, don't look for what's not there
Because I'm being all that I am

I give what I have and am made to feel it isn't enough
You want more, when there isn't any
If I change to suit you, I'd become someone other than myself
So, don't look for what's not there
Because I'm being all that I am

What I have to give, I give and I give willingly
I'm being me at all times
Don't down me for being me,
Because I'm being all that I am

(Poetry To Suit Your Mood -
Copyright - 1990 - Inez Harrison)





þþ BLUFF YOUR WAY IN COMPUTERS þþ

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

(Buba Ozone's)
THE COMPLETE GUIDE ON HOW TO
BLUFF YOUR WAY IN COMPUTERS
---------------------------
Chapter 1 - PART ONE

COMPUTER BLUFF

It's the easiest thing in the world to bluff people into
believing that you're a computer expert. Simply drop all
words from your conversation except "the", "and,"
"initialization," and "configuration," and then fill up the
spaces with letters, numbers, and a few jargon words.

The only disadvantage of this method is that when you're
dealing with the public, you may begin to notice a

strange 
reaction in your listeners. First, their eyes glaze over;
then they suddenly remember an important appointment. On the
other hand, if you try this bluff with a real computer
expert, he (usually only a "he" is strange enough for this
vocation, but a good bluffer doesn't make any rash
assumptions) will immediately accept you as an expert and
respond enthusiastically in exactly the same way. At this
point your eyes will probably glaze over, shortly before you
suddenly remember an important appointment.

Since the point of bluffing is to make oneself more exotic
and interesting, this simple form can rarely be recommended,
but that doesn't mean it's difficult to bluff in this field.
The general public holds computers and computer people in
awe, convinced that both are intrinsically intelligent and
interesting. At no time should the public ever be given the
slightest hint of the truth.

There is actually no activity in which it is easier to be
accepted on equal terms with experts - as long as you follow
these seven Golden Rules for Computer Bluffers.

GOLDEN RULES FOR COMPUTER BLUFFERS

1. The "Today I'm an expert on PC-DOS" ploy.

Always be an "expert" on a different type of computer from
that of the person you're talking to. While computers often
look the same on the outside, inside the only similarity they
have is that they all work on electricity (except for the
abacus, of course, which works on gas). One of the main areas
of difference is the operating system - a delightfully vague
concept that no one knows too much about, so there's little
chance that anyone will ask you a meaningful question about
why it's so important.

Just mention to a UNIX expert that you work only on PC-DOS
(or vice versa), and you are suddenly totally and utterly
safe. This comment is the computer person's equivalent of
saying, "Oh, by the way, I speak Swahili and don't understand
a word of English."
In fact, there's probably a greater
chance of meeting a fluent Swahili/English translator at a
party than of finding a computer expert fluent in two
operating systems.

If you're surrounded by experts and worried that someone
might understand both PC-DOS and UNIX (although computer
experts seldom get invited to good parties), make up your own
operating system. There are many really obscure formats,
usually devised for a computer that sold three models before
the company went into bankruptcy, so no one is likely to
object that they have never heard of your operating system.

Remember to end the name of your phony operating system with
DOS (stands for Disk Operating System; whatever you do, don't
start talking about loading tapes - that's a dead giveaway
that you're really a Commodore VIC-20 owner). Virtually
anything ending in DOS will do, but be wary of using the old
"DUMS-DOS." It's unlikely that real computer buffs will get
the joke, but you might just be unlucky enough to meet one
with a sense of humor.

2. The "Oh, still using that one!" putdown.

Always sneer at every computer or operating system, other
than your own. Experts in other operating systems will sneer
at your operating system, as if they were once experts on it
but rejected it as useless, even if it's one that you've made
up.

If your opponents admit to having an 8-bit machine, claim to
have a 16-bit machine. If they have a 16-bit machine, claim
to have a 32- bit machine (although if they have a 32-bit, it
would be pushing things a little to claim to have a 64-bit
machine). Don't worry about the difference between 8-, 16-,
and 32-bit machines. Few people in the world could explain
what the exact difference really is (something having to do
with a bus, which sounds totally ridiculous), so you can just
assume that a 16-bit is twice as good as an 8-bit, and so
forth.

3. The "I wouldn't dirty my hands" opening.

Never admit to using a computer for any practical purpose.
Never mention using a spreadsheet, data-base, or, worst of
all, a word processor. The real computer bluffer should have
a computer only for some peculiarly esoteric purpose having
to do with programming. To admit that you gained some
commercial advantage from your computer is like an avant
garde poet admitting to writing greeting-card verses.

4. The "It needs a little tweaking" gambit.

Never admit to using a commercial program. If you're forced
to admit that you use something, say you run a PD program
(see PUBLIC DOMAIN), but you wouldn't recommend that everyone
use it because it takes a little tweaking to get it to run.

Tweaking is a technical term that means taking someone else's
program, usually written for a different computer, and
improving it or adapting it to work on your machine. (It's
like those people who devote their lives to taking the engine
out of a Volkswagen and replacing it with one from a Lear
Jet. However, tweaking isn't as much fun and usually has less
chance of success.)

Ninety-nine times out of a hundred you will be perfectly
safe with this routine. Anyone with any pretensions to being
a computer buff has a houseful of PD programs that they can't
get to work - programs bought on the recommendation of a
friend who mentioned it to someone else. If you're really
lucky, you could one day find your spurious program being
recommended to you - although "it might need a little
tweaking."
If this happens, you can regard yourself as a
master bluffer.

If you have to quote a name, remember that all PD programs
have names made up of words with the vowels missing, like
SPRDSHT, or are just a random selection of letters (see TLA).
Pretend to have gotten it from PC-SIG or Exec-PC or to have
downloaded it from a bulletin board.

5. The "And now for my next trick" trick.

Always be on the point of buying a new, far more powerful
computer. It should be a "fifth generation portable 32-bit
machine"
with "true multitasking" that can handle Mandelbrot
equations and perform open heart surgery at the same time. If
anyone dares to admit that they haven't heard of it, just say
the Apple still has it under wraps but that it was being
whispered about at COMDEX. No one will disbelieve that.

6. The "In your day they loaded programs with tape
recorders"
gambit.

It's a general rule throughout the computer industry that you
should be young. Very young. There's no point in bragging at
age 25 that you can program in Pascal. Within minutes you
will be confronted by a nine-year-old who has been
programming in assembler for the last two years. It's simpler
to keep dying your hair and never admit to remembering a time
when there wasn't a right wing in the Republican party.

In the same vein, remember that the computer industry is one
of the few spheres of activity where experience is totally
useless. Even as a new computer is launched on the market,
the company's R and D (Research and Development) team has
already developed one with twice the capacity at half the
size - which is, of course, totally incompatible with the
existing model.

Do not be impressed by stories of years of computer
experience. Anything learned ten years ago is as useful as
hunting a saber- toothed tiger with a flint-tipped spear.

7. Become a master of the TLA.

By far, the most important concept you have to grasp to be a
successful computer bluffer is how to use the TLA - the only
piece of computer technology that is common in every form of
computer from the 32k game machines to the massive
mainframes. There is no area of computing that does not use
the TLA extensively, and knowledge of how to use it properly
can confer immediate status on its user. The TLA, of course,
stands for the Three Letter Abbreviation.

How the TLA was invented is lost in the mists of antiquity.
Why three letters should be chosen is a total mystery. It has
been suggested that "three" was picked by early computer aces
because of the well-known fact that computers can count only
up to two (see Binary), and this disability was proof that
their human operators were still superior.

A great deal of ingenuity has gone into creating the most
unlikely TLAs. The original idea was that the letters should
be the initials of real words, but this intent is of only
passing interest to the computer buff. People quite happily
use TLAs for many years without the slightest idea of what
they really mean. For instance, people use TLAs such as CRT
or VDT every day without knowing that they mean Cathode Ray
Tube and Video Display Terminal - both referring, of course,
to the computer's screen.
Never think the TLA makes for easier conversation. Try saying
"CRT" and the "screen," and decide which one you think is
easier to utter. The real reason for the TLA is:

(1) to cause confusion
(2) to be intentionally obscure
(3) to allow the user to feel smug, much as lawyers use
Latin

Use the TLA mercilessly. The only areas to avoid are ones
that are so well known that everyone thinks they know what
they mean (CIA, IRS, FBI, etc.). Once you're sure that you're
not competing with a real TLA, the rest of the alphabet is
yours to play with (you would need a computer to work out the
number of possibilities).

So never again say three words when three letters will do. A
good computer bluffer will take the NNB (Number Nine Bus) to
his POE (Place of Employment) after a good breakfast of KRB
(Kellogg's Raisin Bran).

-------------------------------------------------------------
This concludes Chapter One, Part One of HOW TO BLUFF YOUR
WAY IN COMPUTERS....See the next Intelec newsletter for
Chapter One, Part Two.
-------------------------------------------------------------






þþ FROM THE COORDINATOR þþ
by
Cliff Watkins

Networks have been coming and networks have been going, it
is the nature of the beast you might say. As it is with
BBS's it's the same with networks. It seems the higher
quality a bulletin board is, the faster it grows and the
longer it lasts and because this idea parallels networks, I
feel it's the reason for the growth of the Intelec Network.
"Quality" has been our biggest claim to fame and is the most
important factor of our growth.

Many nets are experiencing the constant "fighting and
bickering"
that can detract from the enjoyment of doing what
we do. We too have not been 100% free of this but our
problems have always been settled swiftly and in a mature
manner. Our NetAdmin conference has always been a public
forum for users and SysOps alike to air their opinions and to
have a say in our network. This "democratic approach" has
been a big plus for us in resolving many situations before
they have a chance to get ugly. And there's very little if
anything at all, that goes on behind "closed doors".

Intelec Network will not charge annual fees that several
networks charge as it is my opinion that all SysOps have
enough to worry about with the cost of running their own
board. I handle my costs and you handle yours. I feel that's
a fair approach to take.

These are just some of the reasons why the Intelec Network
is one of your better choices for network mail. We're big
but not over- bearing, we're not overburdened with red-tape
and politics. We're mature and intelligent but with a
friendly helpful atmosphere and general disposition. And
we've got author and vendor support from some of the best
names in the business. Give the enclosed files a look and
you'll agree, your BBS should carry the Intelec Network.

Cliff Watkins, Intelec Network Coordinator.





þþ CONFERENCE PROFILES þþ
Compiled by Bob Walthers

||-|-|-|-|-|Ú-Ù
|-|-|-|-|-|-|
Ó-----------Ù
THE IN BASKET
Intelec Network

-------------------------------
THE STAR TREK CONFERENCE
-------------------------------

The Star Trek conference is the most active Intelec
conference. Since its inception there have been more than
11,000 messages posted, and now there is an average of 40 to
60 messages posted every day. Topics range from TOS (The
Original Series), TAS (The Animated Series), TNG (The Next
Generation), and all 5--soon to be 6--movies.

Some of the participants of the conference have information
about upcoming episodes, movies, and conventions. If you want
info about Star Trek, this is the place to ask.

Bill Lambdin, Conference Host
-------------------------------

-------------------------------
PETS 'N VETS CONFERENCE
-------------------------------

People who have pets (and usually consider them a part of
their family), or who want to have pets, participate in the
Pets 'n Vets conference. Topics of discussion range from pet
feeding to training, behavior problems, signs of illness,
selection of a pet, humorous incidents, grief over loss of a
pet, and so on. Discussions center around all kinds of pets,
including the following: cats, dogs, birds, horses, snakes,
ferrets, mice, and so on.

Participants in this conference are a diverse group with one
thing in common: They respect and dearly love their pets. A
lot of support and information about pets is liberally
traded. At least two veterinarians are sometimes available to
answer questions, and participants also ask their own
veterinarians questions and report back to the conference.

Doris Marsh, Conference Co-Host
John Seher, Conference Co-Host
-------------------------------

-------------------------------
SHAREWARE CONFERENCE
-------------------------------

The Shareware conference is a lively location to talk about
one of the top reasons we call bulletin boards: Shareware.

With support from Shareware authors, points of view that are
divergent and a general "hardware store-helpful" feeling, the
Shareware conference is a good place to gather to learn about
the latest shareware and get some assistance on that program
you just tried out. Stop by and jump right in.

Patrick Grote, Conference Host
-------------------------------

-------------------------------
FINANCE CONFERENCE
-------------------------------

Bonds, stocks, IRAs, savings accounts, treasury bills...they
can all get you down when you need to look for a place to
stash the cash until retirement.

Stop by the Finance conference for timely advice from people
who don't speak financial-ese. Learn about efficient ways to
get daily stock quotations from the online networks. Check
out what others have to say about certain companies, growth
stocks, what's hot and what's not.

Patrick Grote, Conference Host
-------------------------------

-------------------------------
SPORTS CONFERENCE
-------------------------------

Don't like the way your team has been playing? Do you think
that you can run the team better? If so, stop by and let 'em
know in the Sports conference. It's the gathering place for
armchair quarterbacks/coaches to be in the spotlight.

Lucid discussion of sports in a friendly, tavern-like
atmosphere. Instant replays are encouraged, as well as
personal scouting reports, fearless prognostications and
timely tidbits. Grab your favorite beverage and join the
bunch.

Patrick Grote, Conference Host
-------------------------------

-------------------------------
RELIGION CONFERENCE
-------------------------------

This conference, as the name implies, exists for the
discussion of religion in its many facets. People of all
religions and none are invited to participate, with the
proviso that no bashing is permitted and no proselytizing is
allowed.

Here is a place where we can learn about each other's
beliefs and practices and where we can also learn tolerance.

The conference moderator, Rev. Paul Busby, is an Interfaith
Minister whose personal religious practice is neo-Pagan.

Paul Busby, Conference Host
-------------------------------

-------------------------------
RECOVERY CONFERENCE
-------------------------------

The recovery conference is a place in which members of
12-step groups, such as Alcoholics Anonymous, can share their
experience, strength, and hope with each other.

"Anonymous" programs include Debtors, Overeaters, Gamblers,
Narcotics, etc., as well as ARTS, or Artists Recovering
through Twelve Steps, for people who are powerless over their
creativity.

The conference moderator, Paul Busby, quit drinking in 1963
in A.A. He also qualifies for other programs.

Paul Busby, Conference Host
-------------------------------

-------------------------------
ANIMAL RIGHTS CONFERENCE
-------------------------------

Do you think animals have rights? Do you believe animals
have no rights, but humans have a moral obligation to treat
animals humanely? Perhaps you believe that animals have no
rights, and humans have a right to use animals in anyway they
choose.

Whatever your beliefs are, you're invited to discuss them in
the Animal Rights Conference. This echo conference is not
just for users in favor of animal rights, but it is also for
those who are undecided or against animal rights. All
viewpoints should be discussed so that individuals can make
an informed decision on where they stand with this emotional
issue.

Doris G. Marsh, Conference Host
-------------------------------

-------------------------------
WORD PROCESSING CONFERENCE
-------------------------------

What's your favorite word processor or editor? What do you
love about it? What do you hate? What problems are you
having? What are your pet peeves?

Whatever your text processing choice, you're invited to come
talk about it in this conference. Most everything is fair
game, from WordStar to XyWrite, Microsoft Word and WinWord to
WordPerfect and QEdit. Users discuss macros, tricks,
configurations, mail merge, styles, and related text
processing programs. You'll certainly get your word's worth
here!

Bob Walthers, Conference Host
-------------------------------
IN-Basket ends.




þþ IRAQ ATTACKS LOCAL BBS's FOR REVENGE þþ
Humor by Ron Hossack

Iraq has hired locals to take revenge on the damage inflicted
upon Hussein's country. It was reported that one of the more
infamous BBS's, The Solid Rock, was the selected target. They
launched a SCUD in an effort to cripple that sacred place
where modem junkies could find their daily fix.

After diligently checking all his equipment, the SysOp began
to have nightmares. Was it the HST going kaput??? NO! NOT
THE HST!. . .was he going to have to move back to slug cps
with the dreaded 2400????

After some serious tracking down of all systems and they
were a go, that blessed SysOp called on a couple of friends
(Cripple ToTs and Torah Hileman) to finish tracking down the
terrorist.

The SCUD was discovered, someone had called the phone
company and had CALL WAITING added to the BBS line. . . now
heads were put together on who the terrorist was that would
send the SCUD to cripple the BBS and leave all those modem
junkies without their fix.

After considering that this SysOp has no known enemies and
is truly loved by all modemites, we turned on the DEW
defense and looked around to where we could launch the
PATRIOT to blast that incoming SCUD.

THE ENEMY WAS FOUND!!!!

A new hit version of the movie "SLEEPING WITH THE ENEMY" was
discovered.

It turns out it wasn't a Iraqi Terrorist, but a worse
terrorist. It was the WIFE! She said, I called the phone
company and had call waiting added to our voice line. The
only problem was that it was the data line and not the voice
line.

PRACTICE SAFE PROTECTION

OK boys and girls, here a lesson in how to have safe and bug
free modem line. Call your Phone Company and have a password
added to your data line so that no one but you can make any
changes to that precious line.

MODEM REVENGE

For you ladies that have suffered extreme mental abuse
caused by that computer and more so, that Modem connected to
that computer. Don't get mad and threaten him that he'll have
to sleep on the couch. . .you could lay across the keyboard
naked and that addicted person would just say, "Is there
something you want honey"
, while never taking his eyes of the
monitor.

Just smile, put on a dap of Cartier, touch up your hair with
Clariol #108 and say, "Honey, I will call and have
CALLWAITING added to this line if you don't give me some
time."



þþ EXTRA ROOM FOR SYSOPS þþ
by W.H. Lambdin

Do you or a friend run a Bulletin board? If so; here is a
little tip that you may not be aware of.

How would you like to have additional room on your drive? I
am not talking about buying a disk doubler card, or
compressing your executable files with PKlite ot LZEXE. I am
talking about your ZIP file comments.

If you use ZIP file comments, these are not compressed!

If your comment is 1 K, and you have thousands of .ZIP files.
that 1K really adds up. If you have 1024 files. You would
save 1 meg by deleting the comments.

I know of a BBS that uses a 2.5K comment, and has almost
20,000 files. This SysOp could save 50 meg of space!

It is always best to add a file to the archive instead of
using the comments.



þþ PROGRAMMER'S CHALLENGE DEPARTMENT þþ

As an editor of this magazine, I will be challenging you,
programmer or user, to make or find a program that is better
than one(s) I will be discussing. Usually I will only be
discussing one or two programs per issue. Reason being is
that I'll only be picking what I consider to be top quality
programs that are the best in their category.

Also you, as a programmer, are welcome to send in a challenge
yourself. If you write a program that you think is better
than anyone else's, send it to us along with an article, not
a document, about your program showing off its features so
that we can place it here in this department for others to
know about. This may help you make some money if your
program is Shareware, news can travel around pretty fast on
BBS's. Along with reception of your program and article, you
will get a reply from me in this department, whether it be
compliments, comments, suggestions, or criticism. So don't
complain about what I might say, because you can clearly see
what all possible statements can be made toward your program.
Remember, if you send in a program and article, it would seem
that you are confident in what you do. Also all statements
are toward your program, not you. I would not want to offend
any person and start a argument. Don't let these statements
scare you off, I'm not a bad guy, I just try to give public a
general view. Everything I will be saying will be my
opinions only, unless I actually run tests to get true
statistics about your program.

Reader's please send in your responses to me. Let me know if
you think my choices are good or bad. It doesn't matter to me
if you agree or dis-agree with me because everyone has their
own opinion.


PASSWRD2.ZIP
by W.H. Lambdin

Password is a security measure to prevent casual users from
accessing your computer. There is no way to keep experts away
from your data with any degree of certainy.

Password written by Gerald A. Monroe, 1241 Bunts Road,
Lakewood, Ohio 44107. The author asks that you send the $10
registration fee. If you want the latest update; enclose an
additional $3.75.

To install Password copy the PASSWORD.SYS file to your root
directory or the DOS directory. Now edit your CONFIG.SYS to
say something like this.
DEVICE=C:\DOS\PASSWORD.SYS

This little device driver only requires 3K of conventional
RAM, and it is well worth the security.

There is two options you can set. I do not use either one.

/T Transient mode where the program is unloaded after you
enter the password

/Q Quiet mode

Passwords

The default password is "password" This can be changed any
time the program asks you to enter the password. by typing
the correct password\new password you want to use. Passwords
must be at least characters; but no more than 70 characters.

If you enter the wrong password three times; the computer
locks up with the message "Access denied" If you wait 1
minute without entering the password; the machine locks up as
described above.

If you load Password without the /t parameter you have
access to a fast and painless keyboard lock when you step
away from the computer, and don't want to power down.

To activate the keyboard lock; press ALT-Backspace. The
speaker will beep twice to let you know the program is
working. Even ALT-CTRL-DEL combination will not work. ;-)

To deactivate the lock; press ENTER to clear the keyboard
buffer, then type the password and press ENTER. The computer
will beep twice again.

This program isn't perfect; but it works. If someone presses
CTRL-BREAK; the computer will freeze, and you must re boot.

Passwords major short coming is that it doesn't disable the
CTRL-BREAK combination. If you use QEMM; and someone presses
CTRL-BREAK. QEMM will report an error and offer the ability
to terminate the program. This will drop you to the C: prompt
95% of the time.

Password was written in 1989, and I would like to find a
newer version; but it is the best security routine I have
ever used. This does almost everything except for protect the
hard drive, and only needs 3K. Most of the other programs I
have tried have either been flaky, or requires 50 to 100K of
memory.

The only way to circumvent this security program is to stick
a bootable floppy in drive A: and reboot. Password loads in
the CONFIG.SYS, and asks for the password before the
Autoexec.bat, or the command interpreter. Rating ****




þþ QUESTIONS AND ANSWERS þþ

Q: I just discovered ZIP Magazine! Is it still in production?
Beth Williams

A: ZIP Magazine is still in production and growing. With this
issue -4-3 we are merging with the In-Basket Newsletter.

Ron Alcorn and I started ZIP Magazine in September of 1988.
That was about 4 months before Phil Katz introduced his new
archive program PKzip.


We basicly started ZIP because we found a niche that wasn't
supported. Most Magazines try to push high speed computers,
and software that costs hundreds.

Ron ran a BBS, and I had just started in MS-DOS computers,
and I noticed that many people call BBSs asking for help with
using their computer, and looking for affordable software.

After making that observation, we started ZIP Magazine. We
didn't have a clue that ZIP would become popular. In fact, we
never planned beyond our second issue

This is our 17th issue of ZIP Magazine. In the last 34
months, we have heard reports that ZIP Magazine has been
found in the following countries; Canada, Greece, South
Africa, England, and Israel.

ZIP magazine has grown and developed dramatically, but we
still support new to intermediate MS-DOS users.

I sure hope the quality is improving; espacially the gramar.




þþ BBS LISTING þþ

201 471-6391 PASSAIC BBS. Baud 300 - 19,200 using Hayes
V-series. Storage unknown. Sysop James Roy.

207 374-2303 CELEBRATION SHOP. Baud 1200, soon to be 2400.
Storage unknown. Operates 24 hours a day, Sysop Paul
Stookey. #3 Neworld Square, Blue Hill Falls Maine, 04615.
Paul Stookey was Paul in the singing group {Peter, Paul,
and Mary.}

216 264-5116 <TRI>-<WAY> BBS. Baud 300 - 2400 24 hrs.
Running Wildcat 2.0 multinode. Storage 130 meg. Carrying
ZIP Magazine. Over 500 files. Located in Wooster, Oh.
Sysop Dann Way

314 774-2736 The Waynesville BBS. Baud 300 - 2400. Running
Wildcat 1.13. with 104 meg. Sysop Raynond Andrell.
Specializes in FUN!!!

318 352-8311 Genesis BBS. Baud 300 - 2400. operating 24
hours a day. 65 meg storage. Sysop James Pottorff.
Genesis BBS is located in Natchitoches, LA.

318 457-1538 Toepfer's Electronics BBS. Baud 300-2400 Running
M&M BBS on a C-64. 24 hours of operation. Free
Registration. Storage 2 meg. Files for C-64, and MS-DOS
computers. Member of KSAT QDP. Home BBS of Citizens
Aligned for Better Television. SYSOP Darrel Toepfer.
Located in Eunice, La.

409 362-2020 Almost Heaven BBS. running Remote Access on 386
with 65meg HD. A Zip Magazine dist. point & other news
files. Online Reading of Zip and others news ; Caller
can d/l these on first call with no u/l's . 24 hour a day
. SysOp Woody Angel in Chireno,Texas

416 751-6337 (Data on 20 Node RBBS Customized System) Operate
BBS under the name of THE TORUS SUPPORT NETWORK,
Division of PCanada Systems Inc. 3 Giabytes on-line
including 4 CD-ROM's and operate primary server under
Microsoft OS/2 base LAN Manager (330 megabyte Priam Main
Server on a 386 20 Mhz Acer platform). System Sysop is
Bob Eyer, and we are currently in our seventh year of
operation.

501 273-9257 THE CHICKEN COOP. Baud 300 - 2400.
501 273-0152 THE CHICKEN COOP. Baud 9600. FOR HST, and V.32
modems. Running TBBS 2.1m. 130 meg of storage. Has many
online features including ZIP Magazine, InfoMat, and USA
Today. A member of the Software Distribution Network
which supplies virus and trojan free software direct from
the author's. SysOp Don Chick.

501 422-8777 The Personal Resource System. Baud 300 - 2400
501 444-8080 USRobotics Dual Standard (HST/V.32). This BBS
has several online publications such as InfoMat, Business
Sence, ZIP Beep, NASA Press, Online Digital Music Review,
USA Today, Amy Info, C-News Letter, and ZIP Magazine.
24 hours of operataion with 260 MEG of storage.

606 432-0879 STRAWBERRY PATCH. Baud 300 - 9600. Running PC
Board on a 286 machine. storage 1000+ meg (with PC Sig
library on CD-ROM. Files for MS-DOS. No download ratio,
but uses a point system. 45 mins access on first call.
Sysop Terry West. Located in Pikeville, Ky.

606 789-3423 The AdventureComm BBS. Running ProLogon 1.0, and
ProDoor 3.2. Baud 300 - 9600 (HST). Storage 95 meg.
Sysop Charles Baldridge. Located in Paintsville, Ky.

606 878-9500 ZIP BBS. Baud 1200 - 9600 using USRobotics Dual
Standard (HST/V.32). Running Spit Fire 2.8 on 12 Mhz AT
machine. Storage 60 MEG. Files for MS-DOS. Download
ratio 25 to 1. Full access on first call, no
registration hassles. Operates from 7 P.M. to 7 A.M.
(EST) 7 days a week. Sysop's Ron Alcorn & W.H. Lambdin.
Located in London, Ky.

609 327-5553 UNION LAKE BBS. Baud 300 - 2400. Running PC
Board on an 8088 machine. Free Registration. Storage 94
meg. Sysop George Cuccia. Carries 29 mail conferences.

612 654-8372 G C B BBS. Baud 1200 - 9600 Using U.S. Robotics
HST. Storage 200 meg. Online 24 hours a day. SysOp
Christine Blount. 30 minutes access on first call. This
BBS is located in St. Cloud, Mn.

616 382-3555 BIOS. Baud 300 - 9600 HST. Running WWIV v4.10
on a 8 MHz 8088 Turbo XT Machine. Storage 100 Meg. WWIV
national network node 6650 in Kalamazoo, Michigan. Large
MS-DOS file selection, interesting message base and many
on-line games. SysOp Scott Randall.

703 742-6279 CORVETTE DRIVERS. Baud 1200 - 19,200. Running PC
Board on a 386 machine. Storage unknown. Files for
MS-DOS Download ratio 25 to 1. 45 mins access on first
call. Sysop David Arline.

714 785-9176 THE SOLID ROCK (CACOL) BBS. Baud 1200 - 38400
HST Running Spitfire 3.0; 165 meg storage. Sysop Ron
Hossack. Christian oriented system and doors available.
Solid Rock is located in RIverside, CA.

818 961-7903 CALIFORNIA BUILDERS BOARD - (A MicroLink PCUG
SubBoard). Baud 300 - 2400. Running PCBoard 14.1/E3

919 383-8707 Bull City BBS. Baud 300 - 2400. Running Wildcat
1.13 on an 8088 machine. Storage unknown. 24 hrs
operation. Sysop Roy & Shirley Gurley. This BBS has over
55 doors.

If you would like to advertise your BBS in ZIP Magazine,
leave a message on either of the two home BBS's. If you have
access to the ZIP Magazine message conference (Part of the
Intelec network) you may leave you BBS ad's there. We would
allow you to leave a message on any support BBS, but they are
getting to numerous, and also the busy signal doesn't help us
any either.




þþ USERS GROUPS þþ

É-----------------------------------------------------------»
| |
| B.G.A.M.U.G. |
| The Bowling Green Area MS-Dos Users Group |
| |
| BGAMUG meets the 4th Tuesday of the month in the library |
| of Bowling Green High School at 7:00pm. Beginning Dos |
| classes are being planned and will be held in the |
| Computer Science classroom of Bowling Green High School |
| on Tuesday and Thursday evenings. |
| |
| For more information contact: |
| |
| BGAMUG |
| P.O.Box 20384 |
| Bowling Green, KY |
| 42102 |
| |
È-----------------------------------------------------------¼

P.A.C.E User's Group

(Prestonsburg Area Computer Enthusiasts). We meet at 7:00pm
each first and third Tuesday at the Prestonsburg Public
Library. All age groups are welcome. We provide guest
speakers, DOS instruction, and are preparing to start a Q&A
column in the Floyd County Times. The group also supports a
BBS, The PACE/Library BBS, 1200-2400 baud, 24hrs at (606)
886-8403.

-------------------------------------------------------------
Now in its second edition, THE MODEM REFERENCE is the
original guide to buying, setting up, and using modems and
communications software. Published by Brady Books/Simon &
Schuster, it includes complete guide to BBSs and all the
major online services. Get the original, definitive guide to
networking at your local bookstore (ISBN #0-13-589862-5), or
phone 800-624-0023 to order direct. (Retailers, call
800-223-4022.) THE MODEM REFERENCE: DON'T LOG ON WITHOUT IT!




þþ ZIP INFO þþ
by W.H. Lambdin & Ron Alcorn

This is ZIP Magazine, a paperless publication. All
submissions will be printed, unless you ask us not to. We
will not modify any text you submit except for spell checking
and delete foul language. So views expressed here do not
necessarily reflect views of editors.

If you want to send us a submission, upload it to one of
BBS's with a * beside it. You can also send them to ZIP BBS
at (606) 878-9500, or the Intelec BBS in New York. The phone
numbers are (516) 867-4446, 4447, and 4448. Upload material
to conference number 58, the ZIP Magazine conference. When
you upload a submission, use MAG as the extension. We would
appreciate it if all submissions were just ascii, and margins
set at 10 on left, and 10 on right. This isn't demanded, it
would just be easier on us. If you want to submit programs
you have written, send them along in an archive with your
text. We will check all programs and if they prove to be
unsuitable, we will reject them. (You know, trojans,
viruses, and other harmful programs).

If you submit a review, follow examples here. If you think
it is a very good program, rate it at 5 stars. If you think
it is of poor quality, then give it one star. If you think
it falls between grades, use a plus as this. ***+ This means
a rating of 3 1/2 stars, or a little better than average.

We will not make you run from place to place in order to read
one article. When we start an article, it will be printed in
it's entirety before another article will be started. All
advertisements will be found in back. I like to read articles
with as little trouble as necessary, and the same goes for
ad's. We will have advertisements, but the editors take no
responsibility in what you may see advertised, so buy at your
own risk.

With Volume 3 Issue 6 of ZIP Magazine, we are using Galaxy
Lite 1.6. It has all the features in Galaxy 2.43, but more
features have been added. Galaxy Lite is produced by Star
Lite Software. Omniverse has released version 3.0 of Galaxy.
I think they made a mistake!

In order for this magazine to survive, it will need help from
it's readers. If you wish to correct us on something, or
write an article or review for ZIP, please send us your
responses. Any help would be greatly appreciated. If you
wish to reprint an article or review from ZIP, feel free to
use it any way you wish, we only request that you give author
credit, and report that the article appeared in ZIP.





þþ AD þþ
É------------------------»
| 386SX/16MHz BASE system|
É-----------------¼ È----------------»
|Includes 1MB Ram, I/O, 101 Keyboard, 1.2 floppy, Small Case|
| 200 Watt PS. 1 year parts and labor. Shipping extra. |
È-----------------------------------------------------------¼
Bare Mono 14" color CTX HiRes M-Board speed
System VGA SVGA upgrade
É--------Ñ-------Ñ-------Ñ-------»Ú-------------¿
w/o HD or | | | | ||20MHz $204.44|
cntrllers | $776.69| 887.70|1158.66|1218.39|Ã-------------´
Ç--------Å-------Å-------Å-------¶|25MHz $230.00|
| | | | |Ã-------------´
40 MB IDE |$1030.97|1141.98|1412.93|1472.66||25MHz $325.80|
Ç--------Å-------Å-------Å-------¶| w/64K cache |
| | | | |Ã-------------´
80 MB IDE |$1201.35|1312.36|1583.32|1643.05||33MHz $475.33|
Ç--------Å-------Å-------Å-------¶|w/64K cache &|
| | | | || Tower Case |
120 MB IDE|$1332.42|1443.43|1714.38|1774.12|À-------------Ù
È--------Ï-------Ï-------Ï-------¼
É-------------------Ñ--- Upgrades ----Ñ---------------------»
| À-----------------Ù |
| 2400B Int Modem $69.95 |
| 1.44 Floppy $65.52 |
| 2nd Meg $52.42 |
È-----------------------------------------------------------¼
Ú-----------------¿
| ZIP Magazine |
| S P E C I A L ! |
À-----------------Ù
É-----------------------------------------»
| ÛÛÛ ÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ ÛÛ |
| ÛÛÛÛ ÛÛ ÛÛ ÛÛÛ ÛÛÛ ÛÛ ÛÛ |
| ÛÛ ÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛ |
| ÛÛ ÛÛ ÛÛ Û ÛÛ ÛÛÛÛÛÛÛ ÛÛÛÛÛÛ Û ÛÛ |
| ÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ Û ÛÛ ÛÛ ÛÛ ÛÛ |
| ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛ Û |
| ÛÛÛÛ ÛÛÛÛÛÛÛ ÛÛ ÛÛ ÛÛ ÛÛ ÛÛÛÛÛÛ |
È-----------------------------------------¼
386/40MHz system DELIVERED for only $1899.95

40MHz/64K cache AMD 386
40 MB IDE Hard drive
4 MB 60ns RAM on board
1.2 Floppy drive
FULL 256 COLOR SUPER VGA
SVGA Monitor and 16 bit card
AT I/O ports, 101 key keyboard
Free delivery to Continental US

Offer only good when you mention this ad in ZIP Magazine

Call Marty Greenlief at 801 566-4829 aft 6pm MST


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT