home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Lion Share
/
lionsharecd.iso
/
bbs_oth
/
fd202.zip
/
FD.DOC
< prev
next >
Wrap
Text File
|
1991-09-25
|
350KB
|
9,985 lines
FrontDoor 2.02 Noncommercial
User guide
For noncommercial use and distribution
To the memories of Catharina Frodin and Alva Gardlund.
And to Christian, Katja, and Igor Homrighausen.
Table of contents
1 LEGAL NOTICE . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1 Hardware requirements . . . . . . . . . . . . . . . . . . 3
2.2 Software requirements . . . . . . . . . . . . . . . . . . 3
2.3 Additional equipment . . . . . . . . . . . . . . . . . . 3
2.4 BBS software . . . . . . . . . . . . . . . . . . . . . . 3
3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.1 CONFIG.SYS . . . . . . . . . . . . . . . . . . . . . . . 4
3.2 AUTOEXEC.BAT . . . . . . . . . . . . . . . . . . . . . . 4
3.3 Directories . . . . . . . . . . . . . . . . . . . . . . . 4
3.4 Files . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4.1 FD environment variable . . . . . . . . . . . . . . . . . 5
4.2 FD.SYS <> SETUP.FD . . . . . . . . . . . . . . . . . . . 5
4.3 Getting started . . . . . . . . . . . . . . . . . . . . . 5
4.4 Menus . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.4.1 File . . . . . . . . . . . . . . . . . . . . . . . 6
4.4.2 Global . . . . . . . . . . . . . . . . . . . . . . 6
4.4.3 Mailer . . . . . . . . . . . . . . . . . . . . . 11
4.4.4 Editor . . . . . . . . . . . . . . . . . . . . . 19
4.4.5 Terminal . . . . . . . . . . . . . . . . . . . . 22
4.4.6 Modem . . . . . . . . . . . . . . . . . . . . . . 26
4.4.7 Printer . . . . . . . . . . . . . . . . . . . . . 26
4.4.8 Manager . . . . . . . . . . . . . . . . . . . . . 26
4.4.9 Event Manager . . . . . . . . . . . . . . . . . . 27
4.4.10 Folder Manager . . . . . . . . . . . . . . . . . 27
4.4.11 Security . . . . . . . . . . . . . . . . . . . . 29
4.4.11.1 Notes regarding protocols . . . . . . . . 30
4.4.12 Request Manager . . . . . . . . . . . . . . . . 30
5 The nodelist and the nodelist compiler . . . . . . . . . . . 31
Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Region . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Node . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Point . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.1 Hosts and hubs . . . . . . . . . . . . . . . . . . . . 31
5.2 Compiling a nodelist . . . . . . . . . . . . . . . . . 32
5.2.1 FDNODE.CTL . . . . . . . . . . . . . . . . . . . 32
POINTLIST . . . . . . . . . . . . . . . . . . . . . 32
PVTLIST . . . . . . . . . . . . . . . . . . . . . . 32
SWEPULSE . . . . . . . . . . . . . . . . . . . . . 33
PHONE . . . . . . . . . . . . . . . . . . . . . . . 33
USE ZONE . . . . . . . . . . . . . . . . . . . . . 33
DIAL . . . . . . . . . . . . . . . . . . . . . . . 33
COST . . . . . . . . . . . . . . . . . . . . . . . 35
5.3 Nodelist flags . . . . . . . . . . . . . . . . . . . . 35
5.4 Command line switches . . . . . . . . . . . . . . . . . 36
5.5 Points . . . . . . . . . . . . . . . . . . . . . . . . 37
5.5.1 Pointlist . . . . . . . . . . . . . . . . . . . . 37
5.5.2 FDNODE.CTL . . . . . . . . . . . . . . . . . . . 38
5.5.3 Point handling . . . . . . . . . . . . . . . . . 39
5.5.4 Remapping . . . . . . . . . . . . . . . . . . . . 39
5.5.5 POINTNET . . . . . . . . . . . . . . . . . . . . 40
5.6 Sharing the nodelist . . . . . . . . . . . . . . . . . 40
6 Modems and FOSSIL drivers . . . . . . . . . . . . . . . . . . 41
6.1 Basic configuration . . . . . . . . . . . . . . . . . . 41
6.1.1 Hardware . . . . . . . . . . . . . . . . . . . . 41
Modem port . . . . . . . . . . . . . . . . . . . . 41
Maximum baud rate . . . . . . . . . . . . . . . . . 41
Lock port . . . . . . . . . . . . . . . . . . . . . 42
Reset modem to connect speed . . . . . . . . . . . 42
Lower DTR when busy . . . . . . . . . . . . . . . . 42
Lower DTR to terminate call . . . . . . . . . . . . 42
Toggle DTR before dialing . . . . . . . . . . . . . 42
Carrier detect mask (CDMASK) . . . . . . . . . . . 43
6.1.2 Messages . . . . . . . . . . . . . . . . . . . . 43
6.1.3 Command strings . . . . . . . . . . . . . . . . . 43
Escape code . . . . . . . . . . . . . . . . . . . . 43
Return on-line . . . . . . . . . . . . . . . . . . 43
Onhook . . . . . . . . . . . . . . . . . . . . . . 43
Offhook . . . . . . . . . . . . . . . . . . . . . . 43
Dial . . . . . . . . . . . . . . . . . . . . . . . 44
Prefix . . . . . . . . . . . . . . . . . . . . . . 44
Suffix . . . . . . . . . . . . . . . . . . . . . . 44
Delay . . . . . . . . . . . . . . . . . . . . . . . 44
Init-1..Init-3 . . . . . . . . . . . . . . . . . . 44
Down . . . . . . . . . . . . . . . . . . . . . . . 44
Reset . . . . . . . . . . . . . . . . . . . . . . . 44
6.1.4 Answer control . . . . . . . . . . . . . . . . . 44
Manual answer . . . . . . . . . . . . . . . . . . . 44
Force answer . . . . . . . . . . . . . . . . . . . 45
Answer delay . . . . . . . . . . . . . . . . . . . 45
Limited hours . . . . . . . . . . . . . . . . . . . 45
Starting time . . . . . . . . . . . . . . . . . . . 45
Ending time . . . . . . . . . . . . . . . . . . . . 45
6.2 Advanced configuration . . . . . . . . . . . . . . . . 45
6.2.1 The Modem Manager . . . . . . . . . . . . . . . . 45
6.2.2 An example, the HST/DS . . . . . . . . . . . . . 46
6.3 Some sample configurations . . . . . . . . . . . . . . 47
US Robotics HST (older models) . . . . . . . . . . . . 47
US Robotics HST/DS/V.32bis . . . . . . . . . . . . . . 48
6.4 FOSSIL drivers . . . . . . . . . . . . . . . . . . . . 49
6.4.1 BNU . . . . . . . . . . . . . . . . . . . . . . . 49
6.4.2 X00.SYS . . . . . . . . . . . . . . . . . . . . . 49
7 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7.1 The Event Manager . . . . . . . . . . . . . . . . . . . 51
7.1.1 External event behavior . . . . . . . . . . . . . 52
7.1.2 Mail event behavior . . . . . . . . . . . . . . . 53
7.1.3 The @ event . . . . . . . . . . . . . . . . . . . 55
7.1.4 Overlapping events . . . . . . . . . . . . . . . 56
8 Mailer . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
8.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . . 57
8.1.1 Programs <Alt-P> . . . . . . . . . . . . . . . . 57
8.1.2 Utilities <Alt-U> . . . . . . . . . . . . . . . . 58
8.1.3 Mail <Alt-U> . . . . . . . . . . . . . . . . . . 58
8.2 Mail queue <Alt-B> . . . . . . . . . . . . . . . . . . 60
8.3 Call progress . . . . . . . . . . . . . . . . . . . . . 61
8.4 Semaphore indicators . . . . . . . . . . . . . . . . . 62
8.5 Undialable . . . . . . . . . . . . . . . . . . . . . . 62
9 Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
9.1 Main <Alt-M> . . . . . . . . . . . . . . . . . . . . . 63
9.2 Edit <Alt-E> . . . . . . . . . . . . . . . . . . . . . 65
9.2.1 <Alt-T> in edit mode . . . . . . . . . . . . . . 65
9.2.2 Toggle menu <Ctrl-F2> . . . . . . . . . . . . . . 67
9.3 Utilities <Alt-U> . . . . . . . . . . . . . . . . . . . 67
9.4 Purge <Alt-P> . . . . . . . . . . . . . . . . . . . . . 68
9.5 Other keys in edit mode . . . . . . . . . . . . . . . . 68
9.6 Other keys in view (read) mode . . . . . . . . . . . . 69
9.7 Entering new messages . . . . . . . . . . . . . . . . . 70
9.8 Management <Alt-F9> . . . . . . . . . . . . . . . . . . 71
9.8.1 Main menu . . . . . . . . . . . . . . . . . . . . 71
9.8.2 Continuous tagging . . . . . . . . . . . . . . . 72
9.8.3 Range select <F4> . . . . . . . . . . . . . . . . 72
9.9 Keyboard macros . . . . . . . . . . . . . . . . . . . . 73
9.9.1 Examples . . . . . . . . . . . . . . . . . . . . 73
9.10 Carbon copies (CC) . . . . . . . . . . . . . . . . . . 75
9.10.1 Hidden CCs . . . . . . . . . . . . . . . . . . . 75
9.10.2 Using files as input to CCs . . . . . . . . . . 75
9.10.3 Address expansion . . . . . . . . . . . . . . . 76
9.11 Crossposting (XC) . . . . . . . . . . . . . . . . . . 77
10 Terminal . . . . . . . . . . . . . . . . . . . . . . . . . . 78
10.1 Menus . . . . . . . . . . . . . . . . . . . . . . . . 78
10.1.1 File <Alt-F> . . . . . . . . . . . . . . . . . . 78
10.1.2 Line settings <Alt-L> . . . . . . . . . . . . . 79
10.1.3 Session <Alt-S> . . . . . . . . . . . . . . . . 81
10.1.4 Options <Alt-O> . . . . . . . . . . . . . . . . 82
10.2 Keyboard macros . . . . . . . . . . . . . . . . . . . 83
10.3 Raw mode . . . . . . . . . . . . . . . . . . . . . . . 83
10.4 Keypad modes . . . . . . . . . . . . . . . . . . . . . 83
10.5 PC keyboards . . . . . . . . . . . . . . . . . . . . . 84
10.6 Phone directory <Alt-P> . . . . . . . . . . . . . . . 84
10.6.1 Queue status . . . . . . . . . . . . . . . . . . 85
10.6.2 Adding/changing entries . . . . . . . . . . . . 85
10.7 Inactivity timer . . . . . . . . . . . . . . . . . . . 85
10.8 File transfers . . . . . . . . . . . . . . . . . . . . 85
10.9 On-line timer . . . . . . . . . . . . . . . . . . . . 86
11 Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . 87
11.1 Destination of messages . . . . . . . . . . . . . . . 87
11.1.1 Name lookups . . . . . . . . . . . . . . . . . . 87
11.1.2 Address browsing . . . . . . . . . . . . . . . . 87
11.1.3 Address macros (NAMES.FD) . . . . . . . . . . . 88
12 File Requests . . . . . . . . . . . . . . . . . . . . . . . 89
12.1 Outbound Requests . . . . . . . . . . . . . . . . . . 89
12.2 Requesting files with a password . . . . . . . . . . . 90
12.3 Update Requests . . . . . . . . . . . . . . . . . . . 90
12.4 Inbound Requests . . . . . . . . . . . . . . . . . . . 90
12.4.1 Request modes . . . . . . . . . . . . . . . . . 90
Anyone can request . . . . . . . . . . . . . . . . 90
Systems in nodelist can request . . . . . . . . . . 90
No requests . . . . . . . . . . . . . . . . . . . . 90
12.4.2 Directory listings . . . . . . . . . . . . . . . 91
12.4.3 Alias listings . . . . . . . . . . . . . . . . . 91
12.4.4 Response message . . . . . . . . . . . . . . . . 92
12.4.5 Limiting Requests . . . . . . . . . . . . . . . 92
Max match . . . . . . . . . . . . . . . . . . . . . 92
Max size . . . . . . . . . . . . . . . . . . . . . 92
Max time . . . . . . . . . . . . . . . . . . . . . 92
Minimum speed . . . . . . . . . . . . . . . . . . . 92
12.4.6 Limited hours . . . . . . . . . . . . . . . . . 93
Limited . . . . . . . . . . . . . . . . . . . . . . 93
Start . . . . . . . . . . . . . . . . . . . . . . . 93
End . . . . . . . . . . . . . . . . . . . . . . . . 93
Days . . . . . . . . . . . . . . . . . . . . . . . 93
12.4.7 Event restrictions . . . . . . . . . . . . . . . 93
12.4.8 Protecting files and directories . . . . . . . . 93
13 Swapping . . . . . . . . . . . . . . . . . . . . . . . . . . 94
13.1 Complete path specifications . . . . . . . . . . . . . 94
13.2 Loading programs in a DOS shell . . . . . . . . . . . 94
14 CRT environments . . . . . . . . . . . . . . . . . . . . . . 95
15 Message Status Bits . . . . . . . . . . . . . . . . . . . . 96
Private . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Crash . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
File . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
File Request . . . . . . . . . . . . . . . . . . . . . . . 96
Update request . . . . . . . . . . . . . . . . . . . . . . 96
Kill/Sent . . . . . . . . . . . . . . . . . . . . . . . . . 97
Truncate file/sent . . . . . . . . . . . . . . . . . . . . 97
Delete file/sent . . . . . . . . . . . . . . . . . . . . . 97
Direct . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Immediate mail . . . . . . . . . . . . . . . . . . . . . . 97
Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Sent . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
No status . . . . . . . . . . . . . . . . . . . . . . . . . 98
16 Mail routing . . . . . . . . . . . . . . . . . . . . . . . . 99
16.1 Default routing . . . . . . . . . . . . . . . . . . . 99
16.2 Message status . . . . . . . . . . . . . . . . . . . . 100
16.3 Host/Hub/Boss routing . . . . . . . . . . . . . . . . 100
16.4 Qualifying systems . . . . . . . . . . . . . . . . . . 101
16.5 Route commands . . . . . . . . . . . . . . . . . . . . 101
16.6 LIST specifications . . . . . . . . . . . . . . . . . 104
16.7 Using nodelist flags . . . . . . . . . . . . . . . . . 104
16.8 File routing/forwarding . . . . . . . . . . . . . . . 105
16.9 Message forwarding . . . . . . . . . . . . . . . . . . 105
16.10 Multiple zones . . . . . . . . . . . . . . . . . . . 105
16.11 Examples . . . . . . . . . . . . . . . . . . . . . . 105
16.12 Dynamic packing . . . . . . . . . . . . . . . . . . . 107
16.13 Regarding points . . . . . . . . . . . . . . . . . . 107
16.14 Order of evaluation . . . . . . . . . . . . . . . . . 107
16.15 TARGET vs. qualification . . . . . . . . . . . . . . 108
16.16 Restrictions . . . . . . . . . . . . . . . . . . . . 108
16.17 Macros . . . . . . . . . . . . . . . . . . . . . . . 108
MYZONE . . . . . . . . . . . . . . . . . . . . . . . . 108
MYNET . . . . . . . . . . . . . . . . . . . . . . . . . 108
MYPOINTS . . . . . . . . . . . . . . . . . . . . . . . 108
16.18 Supported nodelist flags . . . . . . . . . . . . . . 108
17 EMSI and IEMSI . . . . . . . . . . . . . . . . . . . . . . . 109
17.1 Passwords . . . . . . . . . . . . . . . . . . . . . . 109
17.2 Mail . . . . . . . . . . . . . . . . . . . . . . . . . 109
17.3 IEMSI . . . . . . . . . . . . . . . . . . . . . . . . 110
18 Script language . . . . . . . . . . . . . . . . . . . . . . 111
18.1 What can I do with it? . . . . . . . . . . . . . . . . 111
18.2 Commands . . . . . . . . . . . . . . . . . . . . . . . 111
18.3 Labels . . . . . . . . . . . . . . . . . . . . . . . . 117
18.4 Node block . . . . . . . . . . . . . . . . . . . . . . 117
18.5 PC Pursuit . . . . . . . . . . . . . . . . . . . . . . 117
18.6 How do I update PCP.DAT? . . . . . . . . . . . . . . . 118
18.7 MNEMONICS . . . . . . . . . . . . . . . . . . . . . . 118
19 FDSERVER . . . . . . . . . . . . . . . . . . . . . . . . . . 119
19.1 What is a FDSERVER request? . . . . . . . . . . . . . 119
19.2 Request message . . . . . . . . . . . . . . . . . . . 119
19.2.1 Internal commands . . . . . . . . . . . . . . . 120
19.3 Using it . . . . . . . . . . . . . . . . . . . . . . . 120
19.4 Keeping calls to a minimum . . . . . . . . . . . . . . 121
19.5 Security . . . . . . . . . . . . . . . . . . . . . . . 121
20 Service requests . . . . . . . . . . . . . . . . . . . . . . 122
20.1 Service requests vs FDSERVER . . . . . . . . . . . . . 122
20.2 Setting up . . . . . . . . . . . . . . . . . . . . . . 122
20.3 ^ - + ? . . . . . . . . . . . . . . . . . . . . . . . 124
20.4 Remote system information . . . . . . . . . . . . . . 124
20.5 Security . . . . . . . . . . . . . . . . . . . . . . . 125
20.6 A word of wisdom . . . . . . . . . . . . . . . . . . . 125
21 Global command line switches . . . . . . . . . . . . . . . . 126
21.1 A word of wisdom . . . . . . . . . . . . . . . . . . . 128
22 Environment variables . . . . . . . . . . . . . . . . . . . 129
22.1 FDOPT . . . . . . . . . . . . . . . . . . . . . . . . 129
22.2 FDSWAP . . . . . . . . . . . . . . . . . . . . . . . . 129
22.3 POINTNET . . . . . . . . . . . . . . . . . . . . . . . 129
22.4 FMOVR and FDOVR . . . . . . . . . . . . . . . . . . . 129
23 Semaphore files . . . . . . . . . . . . . . . . . . . . . . 130
24 Batch files . . . . . . . . . . . . . . . . . . . . . . . . 132
24.1 Errorlevels . . . . . . . . . . . . . . . . . . . . . 132
24.2 Categories . . . . . . . . . . . . . . . . . . . . . . 132
24.3 Loading BBS software . . . . . . . . . . . . . . . . . 133
24.4 Different labels . . . . . . . . . . . . . . . . . . . 133
24.5 Same label . . . . . . . . . . . . . . . . . . . . . . 134
24.6 DOBBS.BAT . . . . . . . . . . . . . . . . . . . . . . 135
24.7 EXEBBS.BAT . . . . . . . . . . . . . . . . . . . . . . 135
24.8 Flow (batch files) . . . . . . . . . . . . . . . . . . 136
25 Multi-tasking . . . . . . . . . . . . . . . . . . . . . . . 137
25.1 NS16550 . . . . . . . . . . . . . . . . . . . . . . . 137
25.2 DESQview . . . . . . . . . . . . . . . . . . . . . . . 137
25.3 DoubleDOS . . . . . . . . . . . . . . . . . . . . . . 138
25.4 Multilink . . . . . . . . . . . . . . . . . . . . . . 139
26 Converting from other mail systems . . . . . . . . . . . . . 140
27 Help systems . . . . . . . . . . . . . . . . . . . . . . . . 141
28 Sample (PCP) script . . . . . . . . . . . . . . . . . . . . 142
29 Commercial inquiries . . . . . . . . . . . . . . . . . . . . 145
30 Developer notes . . . . . . . . . . . . . . . . . . . . . . 146
31 Technical specifications . . . . . . . . . . . . . . . . . . 147
32 Credits . . . . . . . . . . . . . . . . . . . . . . . . . . 148
1 LEGAL NOTICE
The FrontDoor 2.02 Noncommercial software and information attached
hereto, hereafter referred to as FrontDoor, is protected by
applicable copyright laws and international treaty provisions.
FrontDoor is provided as is, without warranty of any kind or fitness
for a particular purpose, either expressed or implied, all of are
hereby explicitly disclaimed. Advanced Engineering sarl only
guarantees that FrontDoor will occupy disk space.
In no event shall Advanced Engineering sarl be liable to you or
anyone else for any damages or costs, including, but not limited to,
any lost profits, lost savings, lost income, lost information, loss
of the right to use FrontDoor, or other incidental or consequential
damages arising out of the use or inability to use FrontDoor.
Additional statements by agents, employees, distributors, and dealers
of Advanced Engineering sarl do not constitute warranties by Advanced
Engineering sarl and do not bind Advanced Engineering sarl.
FrontDoor is not public domain, shareware, or freeware; nor does it
stop working after a certain amount of time. FrontDoor is simply free
of charge for individual hobby use by persons holding or aspiring to
obtain a network address (including point addresses) in one or more
of the amateur data communications networks throughout the world. It
is not allowed to use FrontDoor within a commercial environment (ie.
business, governmental organization, association, school, foundation,
or any other form of juridical person) without prior written
permission from Advanced Engineering sarl.
FrontDoor can only be used by physical persons (as opposed to
juridical persons), and installed on a computer which is personal
property. Exception to the rule of personal ownership of the
computer: before the year 1995, individual hobby use (as described
above) of FrontDoor can be carried on a computer owned by business or
state agency if the installation is located and remains in one of the
following countries: Albania, Angola, Bulgaria, China, Cuba,
Czeckoslovakia, Estonia, Ethiopia, Hungary, Latvia, Laos, Lithuania,
North Korea, Poland, Rumania, the Soviet Union, Sudan, Tanzania,
Vietnam, Yugoslavia, or former republic, province or member state of
one of these countries which has turned independent.
Information on how to obtain the commercial version of FrontDoor is
included in a separate section of this document.
You may freely distribute and copy FrontDoor provided no fee is
charged and the FrontDoor archive contains unmodified copies of the
original files as produced by Advanced Engineering sarl or Joaquim H.
Homrighausen. No part of FrontDoor may be modified, altered, reverse
engineered, sold, or distributed in any form which would involve some
sort of trade without prior written permission from Advanced
Engineering sarl.
All Advanced Engineering sarl and Joaquim H. Homrighausen products
are trademarks or registered trademarks of Advanced Engineering sarl
or Joaquim H. Homrighausen. Other brand and product names are
trademarks or registered trademarks of their respective holders.
1
Copyright 1986-1991 Advanced Engineering sarl. All rights reserved.
Documentation and Software written and designed by
Joaquim H. Homrighausen.
2
2 Preface
Welcome to FrontDoor, the complete e-mail package from Advanced
Engineering sarl. It is probably safe to say that an e-mail package,
such as FrontDoor, is one of the most complex types of applications
around. This manual is very straight forward and may seem hard to
understand at first glance. If you get lost, or cannot understand
something, go back and read the section you are having problems with,
carefully.
FrontDoor has been tested on more than four thousand systems for over
five years. It will run under MS or PC DOS versions 3.1 and above;
including 4.x, 5.x, OS/2 1.3, and OS/2 2.0 DOS Mode. It runs under
most LAN software; including Novell and LANtastic. It also runs under
PC-MOS/386, VM/386 and in other multi-tasking environments such as
DESQview.
For complete technical and FidoNet-related specifications, see
"Technical specifications". Although FrontDoor will run on most
machines, there are a few restrictions and requirements.
2.1 Hardware requirements
o An IBM PC, AT, i386, i486, PS/2 or 100% BIOS compatible.
o A hard disk with at least 1 MB available diskspace.
o An asynchronous modem capable of sending alphanumeric
messages such as CONNECT 2400.
o A DTE interface (computer <> modem) that supports CTS/RTS
handshaking (most cables/internal modems do).
o A monochrome or color monitor.
o 384 KB of system memory.
2.2 Software requirements
o MS or PC DOS 3.10 or above.
o A FOSSIL driver such as X00 or BNU.
2.3 Additional equipment
FrontDoor can take advantage of, but does not require, the
following:
o EMS/XMS memory for overlays and memory image swapping.
o EGA/VGA extended screen modes such as 80x43/50 and
132x28.
o AT-style (extended) keyboard.
2.4 BBS software
FrontDoor can be used as a front-end to many popular bulletin
boards including TUBBS, PC Board, RemoteAccess, Maximus-CBCS,
TCL, TPBoard, QuickBBS, SuperBBS, Phoenix RCS, Fido, Opus-CBCS,
and WildCat!.
3
3 Installation
Included in the distribution archive are several files. This document
will walk you through the installation and configuration of the
system. All path names and directories suggested here are not
required. You can change them as you wish, but I suggest you use the
example in this document for a start and then move on to change
things as you become more familiar with the system. In the example,
it is assumed that you are about to install FrontDoor on your C
drive.
3.1 CONFIG.SYS
FrontDoor needs to have a few extra file handles allocated to
keep the nodelist and other files open. Your CONFIG.SYS file
should contain FILES=25 (or higher). If you do not know what
handles means, that is okay, as long as you have the FILES=25
statement in your CONFIG.SYS file. If you are using multi-tasking
software, your FILES= setting must usually be set to something
higher than 25.
You should also have BUFFERS=30 (or higher) in your CONFIG.SYS
file to improve DOS' buffer performance. If you are using a disk
cache, you should have BUFFERS=3 or something close to that.
3.2 AUTOEXEC.BAT
Add SET FD=C:\FD to your AUTOEXEC.BAT file. This will make sure
FrontDoor can find all its system files. You may NOT have spaces
between FD and =.
3.3 Directories
From your root directory (C:\) create a directory called FD. This
is the main (ROOT) directory for FrontDoor. Change the active
directory to FD. Create the following directories:
NODELIST
MAIL
PACKET
FILE
3.4 Files
Copy FD.EXE, FD.OVR, FM.EXE, FM.OVR, FDNC.EXE and FDSETUP.EXE to
C:\FD.
The program files are now installed.
4
4 Setup
The Setup program, FDSETUP hereafter, is used to configure FrontDoor.
Most functions and behavior of the Editor (FM), Mailer (FD), and
Terminal are controlled from FDSETUP. When you start FDSETUP, it
searches for the system file, SETUP.FD, in the directory pointed to
by the FD environment variable.
If the FD variable has not been set, FDSETUP searches the current
directory for SETUP.FD. If it cannot open SETUP.FD, it will ask you
if you want to create a new file or abort.
4.1 FD environment variable
The FD environment variable specifies where FDSETUP should search
for SETUP.FD. If the FD environment variable is not set, FDSETUP
will search the current directory for SETUP.FD. It is recommended
that you add SET FD=<path> to your AUTOEXEC.BAT or other startup
file. This allows FDSETUP, and the other FrontDoor programs, to
locate SETUP.FD without having to be in the same directory.
Usage:
SET FD=<PATHSPEC>
Eg. SET FD=C:\FD
4.2 FD.SYS <> SETUP.FD
The system file was previously (FD 1.99c and FD 2.00) called
FD.SYS and some programs may still require it to be present
before they will run (TosScan 1.00 is one example). It is
therefore VERY IMPORTANT that you COPY SETUP.FD to FD.SYS
whenever you have made changes to SETUP.FD by using FDSETUP.
4.3 Getting started
To create a new SETUP.FD file, make the FrontDoor root directory
the active directory by using the DOS command CD; type FDSETUP
and press Enter. If you have set the FD variable, you do not have
to change the active directory before invoking FDSETUP.
FDSETUP will display a message saying something like "SETUP.FD,
path or file not found". Press <Space> to create a new file.
5
4.4 Menus
There are eight top-level (pull-down) menus. Each function and
menu of FDSETUP will now be described.
4.4.1 File
Shell to DOS Invokes a temporary DOS shell. Type EXIT and
press <Enter> to return to FDSETUP. You can
invoke a temporary DOS shell in FDSETUP by
pressing <Alt-Z> in the middle of input
fields, pull-down menus, selection fields,
etc.
Exit Returns you to DOS or the Mailer, depending
on how FDSETUP was invoked. If you made any
changes to your configuration, you will be
asked if you want to make your changes
permanent or abandon them. You can also exit
FDSETUP by pressing <Esc> at any of the
top-level menus.
4.4.2 Global
Address
Address Defines your network address and alternate
network addresses, or "also-known-as" (AKA).
You must define at least one network address
(the first slot).
Site info Defines your system's name, location,
telephone number, maximum speed, and nodelist
flags.
The telephone number should be specified in
international format, eg. +352 355936 or -
Unpublished- if you do not wish to reveal
this information to other systems.
6
Domains Specifies the name of a network zone. This
should be "fidonet.org" for all FidoNet Zones
(currently 1 through 6).
At the moment, this is only used for the
generation of the ^AMSGID: kludge line and
for inserting "^aVia" information in messages
forwarded by the Mailer (FD).
AKA.. Allows you to specify which AKA to use when
corresponding with certain zones and nets
within zones.
Ie. if you are writing a message to someone
in zone 2 and you have specified that you
wish to use your 2:270/17 AKA for this, the
Editor will automatically use 2:270/17
regardless of your current AKA setting.
This allows you to easily participate in
multiple networks.
Filenames
System Where the FrontDoor system files are stored.
This should NOT be a RAM disk.
Netmail Where Netmail messages are stored, ie. the
Netmail folder. The Mailer unpacks received
messages to this directory. This should NOT
be a RAM disk.
Files Where inbound (received) files are stored.
This should NOT be a RAM disk.
Packets Where the Mailer stores its temporary mail
packets. They are created every time the
Mailer runs a mail event and are removed
after when the event ends.
By putting the Packet directory on a RAM
disk, you can greatly improve the speed of
packing and scanning outbound mail. It is
recommended that you use a sub-directory on
your RAM disk (eg. <drive>:\PACKETS) since
the number of directory entries in the root
directory of a drive is usually strictly
limited.
7
Log file The log file. This is a complete filename,
eg. C:\FD\FD.LOG. The Mailer is the only
program in the FD package that writes
information to this file. You should NOT use
a RAM disk for the log file as it will
disappear if the system reboots.
Banner The contents of this file is displayed to
human callers before the Mailer passes
control to your batch file to invoke the BBS
software. This file is not used if you are
running in mail-only mode. You should NOT use
a RAM disk for the banner file.
Nodelist Where the nodelist database is stored. The
Nodelist Compiler (FDNC) expects to find its
control file(s) here. The Mailer (FD) and
Editor (FM) expects to find the compiled
nodelist database here. If this directory is
not specified, FrontDoor will use the SYSTEM
directory instead. The nodelist directory
should NOT be located on a RAM disk.
In-event This file is displayed to human callers if
the Mailer rejects their call. Ie. if you are
running in mail-only mode or if a mail event
prevents human callers from accessing your
BBS.
MSG Base Where the Editor (FM) expects to find the
Hudson Message Base files (MSGHDR.BBS,
MSGTXT.BBS, MSGINFO.BBS, MSGIDX.BBS,
MSGTOIDX.BBS and LASTREAD.BBS). If you do not
have any folders with MsgBase status, you do
not have to specify this.
Swapping If you enable swapping to disk or there is
not sufficient XMS/EMS memory available. The
Mailer (FD) and the Editor (FM) will use this
directory to store its swap file.
This setting can be overridden by the FDSWAP
environment variable (see "Environment
variables").
8
Semaphore Where the Mailer (FD) and Editor (FM) creates
and looks for the various semaphore files
(see "Semaphore files"). This allows you to
configure a multi-line and/or multi-user
system with different configurations to use
the same semaphore directory.
This is not available in the noncommercial
version.
General
Your country code
Your country code. Eg. USA=1, Sweden=46,
Luxembourg=352. This is used for telephone
number translations. This is related to the
COUNTRY= command used in CONFIG.SYS.
It does not, however, have to be the same as
your COUNTRY= setting. FDSETUP's country code
setting should always be your real country
code.
Screen flickers
FrontDoor attempts to detect if you have a
CGA card that causes flicker if software
performs direct memory access (DMA). The
default for this setting is NO and you should
leave it alone unless you are seeing flicker
on your screen when you use the Mailer (FD),
Editor (FM), and/or the Terminal.
Use "fastkey"
Forces the Mailer (FD), Editor (FM), and the
Terminal to speed up the typematic rate of
your keyboard. This is only valid for
machines with an AT- or compatible BIOS
installed.
If you are using other keyboard speed-up
utilities, leave this to NO; otherwise, the
programs will restore the typematic rate to
the default (slow) when they terminate.
9
Screen blanking
Prevents screen images from "burning in". If
you are using a monochrome monitor, data that
is displayed often in the same location on
your screen can "burn in" and leave ugly
marks. Color monitors usually do not have
this problem.
Since the Mailer (FD) is active more than 80%
of the day on most systems, it may be wise to
enable this option to avoid "burn ins" of the
Mailer's main display.
Blackout timer
Specifies how many seconds of inactivity
should pass before the screen is blanked.
This option is only used if screen blanking
(previous page) has been enabled. You can
"light up" a blanked screen by pressing a
key. The screen will also be lit when the
Mailer (FD) places outgoing calls and when
incoming calls are answered.
Extended keyboard
Specifies which type of keyboard you have
(101/102 or 83/84). FDSETUP will attempt to
"guess" which type of keyboard you have, but
some BIOS flavors does not properly indicate
the type. This allows you to override what
FDSETUP detects.
Force 24-hour fmt
Allows you to force the Mailer and the Editor
to display the time in 24-hour format even if
you are located in a country that uses the
12-hour format, such as the USA.
10
Users
Allows you to specify user names and access levels. The
default name of the first user is System Operator. You
should change this to your own name.
There are three different access levels. Supervisor,
Administrator and User.
A user with Supervisor access can override any
restrictions on folders and messages. He/she can also
change all settings regardless of passwords. You should
only have one user with Supervisor access, but FDSETUP
will allow you to define more than one. At least one user
with Supervisor access MUST exist and is required to add
any additional users.
A user with Administrator access cannot override any
restrictions on folders and messages. He/she has to enter
passwords for protected items before they can be changed.
A user with User access cannot override any restrictions
on folders and messages. The only setting he/she can
change in FDSETUP is his/her own password.
4.4.3 Mailer
Miscellaneous
Mail from unlisted systems
Defines whether or not the Mailer should
accept incoming calls from systems not listed
in your nodelist database. If this option is
disabled (set to NO) and an unlisted system
calls in, the Mailer will terminate the call
immediately.
11
Mail from "unprotected" systems
Defines whether or not the Mailer should
accept incoming calls from systems for which
you do not have a session level password
defined. If this option is disabled (set to
NO) and an unprotected system calls in, the
Mailer will terminate the call immediately.
Mail from unlisted points
The Mailer will by default accept calls from
points of other systems. You can, however,
specify that you do not want the Mailer to
accept calls from points that are not listed
in your nodelist database. If this option is
disabled (set to NO) and a point for which
you have no entry in your nodelist database
calls in, the Mailer will terminate the call
immediately.
Kill empty received messages
Specifies that you want the Mailer to kill
empty messages (messages with no text in its
body) when they are unpacked from mail
packets.
Terminal only (no mail)
If enabled, the Mailer will invoke the
Terminal as soon as it is loaded. This
setting can be overridden with the /M command
line switch.
Mail only (no BBS)
If enabled, the Mailer will not accept human
callers under any circumstances. Use this
option if you do not have a BBS or similar
software running "below" the Mailer.
12
Present all AKAs to remote system
If you have more than one AKA address, the
Mailer will by default attempt to pickup mail
destined for all your addresses during a mail
session.
This can be disabled so that only one address
is presented to the remote system. Which
address is actually presented is determined
by the AKA matching table (described
previously).
Trigger exit upon receipt of netmail
The Mailer will by default only trigger (set)
the exit flag when compressed (following the
ARCmail 0.60 standard) mail is received. If
this option is enabled, the exit flag will be
triggered (set) when NetMail packets (files
ending with the extension .PKT) have been
received. Whether or not the Mailer will
actually exit is controlled by event
behaviors (see "Events") and the mail exit
errorlevels.
Trigger exit upon receipt of ANY file
Similar to the previous option, but will
trigger exit as long as any (file) data has
been received.
13
Print received messages
If enabled, the Mailer will print messages
unpacked from received mail packets.
This is not available in the noncommercial
version.
Busy retries
Defines the maximum number of times the
Mailer will attempt to call a system during
an event (see "Events") if the system is busy
or does not answer on the first call. See the
section about the Mailer for further details
regarding call progress.
Resend retries
Defines the maximum number of times the
Mailer will attempt to transfer mail to a
system during an event if the first attempt
fails. See the section about the Mailer for
further details regarding call progress.
Retry delay
Defines the minimum number of seconds the
Mailer will wait between outgoing calls. This
is used in conjunction with a random timer to
avoid two Mailers calling each other at the
same time (and thus causing both telephone
lines to be engaged).
Delay before first call
The Mailer will by default attempt to place
the first outgoing call as soon as possible.
If this option is enabled, it will delay the
first call.
Days to keep mail history
Number of days to retain entries in the
floating inbound/outbound history files. The
Mailer removes all entries older than this
value from the history files every morning
(at first opportunity after midnight).
14
BBS software name
Name of the BBS software you are running (if
any). This is displayed to human callers
together with the "Press <Esc> twice for
BBSNAME" if the event allows human callers to
access the BBS.
Seconds before passing to BBS
Defines the number of seconds the Mailer will
wait before assuming a human caller. Unless
the Mailer receives two consecutive escape
(ASCII 27) characters, it will attempt to
establish a mail session for the amount
specified here. The minimum and default value
is 11 seconds. The maximum value is 60
seconds.
Minimum undialable cost
The minimum cost of a call for a system to be
processed by the undialable handler. The
undialable handler is discussed in a separate
section.
Honor Return Receipt Requests (RRQ)
Specifies whether or not the Mailer should
generate a Return Receipt for received
messages with the RRQ flag set. The RRQ flag
is discussed in the Editor section.
This is not available in the noncommercial
version.
Log Defines the various level of logging. All
messages will appear on the screen, the log
options defines which of them ends up in the
log file.
15
File requests Controls how the Mailer (FD) treats inbound
File and Update Requests. A separate section
explains File and Update Requests in detail.
FDServer If no password is specified in FDSETUP, the
FDSERVER function is inactive (disabled). The
FDSERVER function is described in a separate
section.
External mail When the Mailer processes an incoming call,
all received characters are processed for a
possible match with any of the external mail
"wake-up" sequences (strings) and if a match
is made, the Mailer exits with the specified
errorlevel of the matching string.
This allows you to run alternate mail
handlers behind the Mailer, such as UFGATE
and Waffle to process uucp mail. Note that
the call is not terminated when using the
external mail interface, the FOSSIL driver is
simply de-initialized and the Mailer exits.
This option is NOT intended for echomail
processors, etc.
To enter characters with an ASCII code below
32 (Space), hold down the <Alt> key, enter
the ASCII code on the numerical keypad and
release the <Alt> key.
Display
Mail waiting flashing
When there is new mail waiting, the text
"Mail" will flash on the Mailer screen. The
flashing can be disabled with this option.
Display clock
Specifies whether or not you want the current
date and time displayed in the top right
corner of the Mailer screen.
Display timestamp
Specifies whether or not you want the Mailer
to display the time to the left of each line
displayed in the main activity window. This
setting does not affect what is being written
to the log file.
Screen size
25 25 line mode.
43/50 43/50 line mode. Only available for systems
with EGA and VGA cards.
16
Auto Specifies that the Mailer should attempt to
automatically adapt to whatever the current
screen size is when it is started. This also
means that the Mailer will not attempt to
reset the screen mode when it is terminated.
Custom Allows you to specify computer register
values to send to the INT 10h (Video BIOS) to
set and reset the screen.
This is not available in the noncommercial
version.
Colors
Allows you to choose between the default monochrome
(black and white) and the default color sets. You can
also choose to customize the colors to suit your own
needs.
Hidden dial info
Allows you to hide portions of telephone numbers that
otherwise would be displayed when the Mailer places an
outgoing call. Eg. The Mailer calls 352-355936, if you
had one of the hidden dial info strings set to 352- the
displayed number would be 355936.
Function keys
Allows you to define up to 20 (24) programs, etc. to
invoke from the Mailer when any of the functions keys are
pressed. The first 10 (12) function keys are accessed
through <F1> - <F10> (F12), the second 10 (12) function
keys are accessed through <Shift-F1> - <Shift-F10> (F12).
Title The title to appear on the screen when you
press <Alt-K> from the Mailer's main screen.
Action The program to invoke or errorlevel to exit
with. To specify more than one program,
separate them by semicolons (;). To exit with
an errorlevel, specify ?<errorlevel>. Eg.
LIST C:\FD\FD.LOG;DEL C:\FD\FD.LOG
Would load the program LIST and pass
C:\FD\FD.LOG as the parameter. When the LIST
program terminates, the Mailer would proceed
to the next command, which in this case
removes C:\FD\FD.LOG.
?255
Would force the Mailer to terminate with an
errorlevel of 255.
17
Pause Specifies whether or not you want the Mailer
to pause when the invoked program(s)
terminates.
Check Specifies whether or not the Mailer should
re-scan the Netmail folder when the invoked
program(s) terminates.
To create a DOS shell that does not force a re-scan of
the Netmail folder, specify C:\COMMAND.COM (or wherever
you have your copy of COMMAND.COM stored) as ACTION and
set CHECK to NO.
Errorlevels
This section allows you to invoke BBS software, or other
similar software, when an incoming call is established
and the Mailer has determined that it is not a mail call.
It also allows you to define an errorlevel to exit with
when mail has been received.
If a baudrate related errorlevel is zero, the Mailer will
display a message to human callers saying that your
system does not support non-mail calls at that speed and
then terminate the call. If you are running in mail-only
mode, the Mailer will never accept non-mail (human)
calls.
If the RECEIVED MAIL errorlevel is zero, the Mailer will
never exit when mail has been received. Whether or not
the Mailer will actually exit when it has received mail
is determined by the current event behavior and whether
or not the received file(s) indicated mail.
The CREATE .BAT FILE option allows you to simplify BBS
operation. If it is enabled, the Mailer will create a
batch file containing the current baudrate, the COM port
used, the number of minutes left to the next system
event, etc. This is described in a separate section.
18
Audio control
The Mailer can sound alarms and make other noises when
certain events occur, such as received mail, incoming
human callers, fatal errors, etc. This section allows you
to control which sounds should be active and when audio
should be active.
Swapping
Determines whether or not you want the Mailer to use
swapping. You can disable the use of XMS/EMS memory for
the swap function. The swap function is explained in the
Miscellaneous section.
Protection
Allows you to protect certain functions of the Mailer
(FD), such as access to the DOS shell, Editor (FM),
Nodelist compiler (FDNC), Terminal, etc. with a password.
This is not available in the noncommercial version.
4.4.4 Editor
Miscellaneous
Netmail.Restricted
Specifies if the Netmail folder should be
restricted. If you enable this, users with
User or Administrator access can only read
private messages addressed to their
usernames.
Netmail.Read-only
Prevents users with User or Administrator
access from writing messages in the netmail
folder. The definition of writing includes
forwarding and moving of messages to the
Netmail folder.
Netmail.Export OK
Defines whether or not users with User or
Administrator access can export messages from
the Netmail folder. The definition of export
includes moving, copying, and export to disk.
Netmail.Use tables
Defines whether or not the translation tables
should be active by default in the Netmail
folder. This can be toggled from within the
Editor.
Netmail.Crash
If the Crash status bit should be set by
default on locally created messages.
19
Netmail.Direct
If the Direct status bit should be set by
default on locally created messages.
Netmail.Hold
If the Hold status bit should be set by
default on locally created messages.
Netmail.Private
If the Private status bit should be set by
default on locally created messages.
Netmail.Kill/Sent
If the Kill/sent status bit should be set by
default on locally created messages.
Use zone gates
Determines if the Editor (FM) should ask you
whether or not you want to send inter-zone
messages via the zone gate, never send
messages via the zone gate, or always send
inter-zone messages via the zone gate.
This is not available in the noncommercial
version.
Del.Orig (Conf)
Del.Orig (Locl)
Del.Orig (NetM)
Determines if the Editor (FM) should ask
"Delete original message" when replying to
messages in EchoMail (Conf), Local (Locl),
and NetMail (NetM)-type folders.
This is not available in the noncommercial
version.
Show hard CRs
If enabled, the Editor will show hard CRs in
messages. The display of hard CRs is disabled
by default and can be toggled from within the
Editor.
20
Margin Specifies the margin at which the Editor
should automatically wrap text when you enter
and quote (replying) messages. The default
value, 60, should not be changed in most
cases.
When you read messages in the Editor, it will
use all available columns (80, 132, etc.) as
the wrap margin.
Keyboard macros
Allows you to define up to 20 (24) strings.
These can be used to insert common text, such
as name signatures, etc. while editing
messages. The first 10 (12) function keys are
accessed through F1-F10 (F12), the second 10
(12) function keys are accessed through Shift
F1-F10 (F12).
The Editor (FM) macro language is discussed
in the section about how to operate the
Editor.
Origin lines
Appended to messages you create in
echomail-type folders to show the origin of a
message. These should include the name and
location of your system if possible.
You can choose default origin lines for all
EchoMail-type folders. You can also choose a
different origin line from within the Editor.
Whether or not the origin line is appended to
messages you enter in echomail-type folders
is controlled by the echo info status bit for
each folder.
Display
Screen size
25 25 line mode.
43/50
43/50 line mode. Only available for systems
with EGA and VGA cards.
Auto
Specifies that the Editor should attempt to
automatically adapt to whatever the current
screen size is when it is are started. This
also means that the Editor will not attempt
to reset the screen mode when it is
terminated.
21
Custom Allows you to specify computer register
values to send to the INT 10h (Video BIOS) to
set and reset the screen.
This is not available in the noncommercial
version.
Colors Allows you to choose between the default
monochrome (black and white) and the default
color sets. You can also choose to customize
the colors to suit your own needs.
Xlat.In and Xlat.Out
Defines the translation tables to use
wherever the translation table status bit is
active. This is used to translate language
specific 8-bit ASCII characters to 7-bit
ASCII when writing messages to disk and vice
versa when reading messages from disk.
The In table is used when reading messages
from disk and the Out table is used when
writing messages to disk.
FDSETUP program automatically creates
reasonable defaults for most countries when
it creates a new SETUP.FD (system) file. If
you are located in an English speaking
country, you do normally not have to worry
about translation tables.
Swapping Determines whether or not you want the Editor
to use swapping for its DOS shell. You can
disable the use of XMS/EMS memory for the
swap function. The swap function is explained
in a separate section.
4.4.5 Terminal
Miscellaneous
Init An additional modem initialization string,
sent to the modem as soon as the Terminal is
started. If you start the Terminal directly
from DOS (FD /T) or have set the
Terminal-only option in FDSETUP, the Mailer's
initialization strings are first sent to the
modem.
Download Default download path. Files that you receive
(download) during a Terminal session will by
default end up here.
Upload Default upload path.
22
Editor Allows you to install an Editor or file
listing program and invoke it from the
Terminal. The Terminal will prompt your for
optional parameters, such as filenames, etc.
This can also be used to invoke external
protocols or external protocol menu programs.
Protocol Zmodem, Telink, or Xmodem. Defines the
default transfer protocol to use for file
transfers in the Terminal. While SEAlink is
an available protocol in the Terminal, it
cannot be set as the default protocol in
FDSETUP.
Emulation ANSI, TTY, VT100 or VT52. Defines the default
Terminal emulation protocol to use in the
Terminal. Note that the Terminal's ANSI
protocol supports the AVATAR (AVT/0)
emulation protocol.
Avatar Allows you to disable the support for AVATAR
sequences in ANSI emulation. This can be
toggled from within the Terminal.
Buffer The size, in KB, of the scroll-back buffer.
Connect noise
Whether or not the Terminal should make noise
when a connection has been established.
Transfer noise
Whether or not the Terminal should make noise
after file transfers.
Use tables Whether or not the Terminal translation
tables should be active by default. See
Editor.Xlat In for a detailed explanation of
translation tables.
Auto Zmodem
Whether or not the automatic Zmodem download
(receive) function should be enabled by
default.
Local echo Whether or not the Terminal should echo typed
characters to your screen by default.
Wrap around
Whether or not the Terminal should move the
cursor to the beginning of a new line when it
reaches the end of the previous line.
23
Delay Number of seconds to wait between outgoing
calls if the number you dialed was busy or
did not answer. If there is more than one
entry in the dial queue, the delay is ignored
and the Terminal proceeds to the next number
in the queue.
Logging Allows you to enable logging of file
transfers, dialed numbers, and time spent on-
line to systems. Similar to the Mailer's (FD)
log output.
This is not available in the noncommercial
version.
Display
Screen size
25 25 line mode.
43/50
43/50 line mode. Only available for systems
with EGA and VGA cards.
Auto
Specifies that the Terminal should attempt to
automatically adapt to whatever the current
screen size is when it is are started. This
also means that the Terminal will not attempt
to reset the screen mode when it is
terminated.
24
Custom
Allows you to specify computer register
values to send to the INT 10h (Video BIOS) to
set and reset the screen.
This is not available in the noncommercial
version.
Keyboard macros
Allows you to define up to 20 (24) macro
strings. These can be used to transmit common
text, such as names and passwords, etc. The
first 10 (12) function keys are accessed
through <Shift-F1> - <Shift-F10> (F12), the
second 10 (12) function keys are accessed
through <Ctrl-F1> - <Shift-F10> (F12).
To enter characters with an ASCII code below
32 (space), hold down the <Alt> key, enter
the ASCII code on the numerical keypad and
release the <Alt> key.
This is referred to as the default macro set.
Xlat.In and Xlat.Out
See Editor.Xlat In for a detailed explanation
of translation tables. The Xlat.In table is
used for characters received from the modem
(remote). The Xlat.Out table is used for
characters typed on the keyboard.
EMSI Profile
Defines the default IEMSI (Interactive
Electronic Mail Standard Information) profile
used to negotiate interactive EMSI sessions
with BBS software supporting it.
Active Determines whether or not IEMSI support
should be active by default.
Name The username you wish to use. If this field
is empty, the ACTIVE field (above) is
automatically toggled to "NO".
Handle The handle you wish to use, or empty if none.
Password
The password you wish to use.
25
Hot-keys
Quiet
Pausing
Editor
News
New mail
New files
Screen Clr
Specifies default user profile options,
allowing you to customize the BBS or on-line
service's behavior.
The Terminal allows you to configure separate
profiles for each individual telephone number in the
Terminal Phone Directory.
4.4.6 Modem
This option is used to configure your modem for use with
FrontDoor. Modems are discussed in a separate section.
4.4.7 Printer
The printer configuration can only be changed in the
commercial version. The noncommercial version defaults to
using LPT1.
4.4.8 Manager
The managers are used to define events, session level
security, file protection (for file requests) and to define
your various message folders.
All managers require that the SYSTEM path has been defined
since they store their data files (EVENT.FD, PASSWORD.FD,
REQUEST.FD and FOLDER.FD) in that directory.
26
4.4.9 Event Manager
Events are discussed in a separate section.
4.4.10 Folder Manager
Folders are used to define different areas (directories, or
boards for the Hudson Message Base) so that you can use the
Editor (FM) to read and write messages in those areas. The
Editor only knows about one folder by default. It is defined
in the Filenames section of FDSETUP (described earlier) and
is referred to as the NetMail folder.
The folder manager has two modes. The first is the view mode,
which is self explanatory. The second mode is the edit/create
mode. It will now be described.
Status The status and type of the folder.
Origin The default origin line to use. This is only
used for EchoMail-type folders with the Echo
info status enabled. Origin lines are used to
identify the origin of a message in EchoMail
conferences. This is required because
echomail is not a point to point environment,
like a telephone conversation or NetMail
exchange.
EchoMail conferences are usually widespread
and can have an unlimited number of
participating systems.
27
Title The title appearing in the folder list when
you select a new active folder in the Editor
(FM).
Board/Path Depending on the type of the folder, this is
either the Hudson Message Base board number
or the DOS path (directory) where the
messages for this folder should be stored.
Users Defines which users should have access to
this folder. If a user does not have access
to a folder, it will not show up on his/her
list of available folders.
Password Defines whether or not access to the folder
is protected by a password. You can allow
users to access a folder, and the password
protect it.
Use AKA Defines which address (AKA) the Editor should
use for the folder. This is only important
for EchoMail-type folders with the Echo info
status enabled. The address is a part of the
origin line.
Folder status
Restricted If enabled, users can only read Private
messages addressed to their username. Public
messages are not affected by this.
Echo info Whether or not an origin line should be
appended to newly created messages. See
Origin (previous page) for more information.
Export OK See Netmail.Export OK described earlier.
Echomail Defines the folder as an EchoMail folder (as
opposed to a Local or NetMail-type folder).
MsgBase Specifies that the folder is of the Hudson
Message Base type, rather than a directory
with .MSG message files. The Hudson Message
Base (HMB) is used by several BBS packages,
such as RemoteAccess.
NetMail Defines the folder as NetMail-type folder (as
opposed to an EchoMail or Local-type folder).
This enabled nodelist lookups, carbon copies,
etc.
This is not available in the noncommercial
version.
28
Local Defines the folder as a Local folder (as
opposed to an EchoMail or NetMail-type
folder). This is usually used to access local
BBS message areas.
Translate Enables the translation tables for the
folder. They can be toggled on/off from
within the folder.
Private Specifies that the Private status should be
allowed (and the default) for messages
created in the folder. This should NOT be
used in EchoMail folders unless the EchoMail
conference explicitly allows this.
Read-only See Netmail.Read-only described earlier.
4.4.11 Security
The security manager is used to define session level
passwords for other systems. It can also be used to
explicitly refuse File/Update Requests and Mail from a
system, and to disable/enable specific protocol and handshake
options to fine tune your outbound mail sessions.
Session level passwords are used to protect the receiving
(called) system in a mail session, and calling system during
an outbound EMSI session, to ensure that the calling system
really is what it appears to be. Anyone can setup a Mailer,
like FrontDoor or D'Bridge and send you mail. If there is
mail waiting for the address they are using, your system will
by default attempt to send it.
You should setup session level passwords for all your common
mail links, such as echomail distribution systems, etc.
System The system address of the remote system. Eg.
2:270/17.
Password Defines the session level password that your
system will present when calling the
specified system and the password that your
system requires to establish a mail session
with the specified system.
Note that some systems treat passwords case
sensitive, ie. ALLAN is not treated like
AlLaN. The Mailer (FD) will treat passwords
case insensitive on incoming (inbound) calls.
They will, however, be sent EXACTLY as you
have defined them here.
You do not have to specify a password to use
any of the other options.
29
FREQs Whether or not the specified system is
allowed to make File/Update Requests (see
"File Requests").
Mail Whether or not your system will allow the
specified system to call your system. Note
that by disabling (setting it to "NO") this
option, you may be in violation of network
policy.
EMSI Whether or not you want the Mailer to attempt
to negotiate an EMSI session when it calls
the specified system.
FTSC1 Whether or not you want the Mailer to attempt
to negotiate an FTS-1 session when it calls
the specified system.
Zap Whether or not you want the Mailer to use the
ZedZap/Zmodem protocol when negotiating an
FTS-6 (YooHoo) session. If this is set to
"NO", the DietIFNA protocol (Telink/SEAlink)
will be used during YooHoo sessions with the
specified system.
YooHoo Whether or not you want the Mailer to attempt
to negotiate an FTS-6 session when it calls
the specified system.
4.4.11.1 Notes regarding protocols
The Mailer (FD) will by default attempt to negotiate a
mail session in the following order:
1. EMSI
2. FTS-6 (YooHoo), ZedZap/Zmodem
3. FTS-6 (YooHoo), DietIFNA
4. FTS-1
The Mailer will ignore any entries in the security manager
with inactive status.
4.4.12 Request Manager
The request manager is used to protect file requests. File
and Update Requests are discussed in a separate section.
30
5 The nodelist and the nodelist compiler
The nodelist is FrontDoor's telephone directory listing and is used
for several purposes. Among these are to allow you to perform name
lookups of other SysOps, to retrieve information about remote
systems, such as the maximum supported baud rate, modem flags, and
system capability flags, to check if a remote system is known to your
system or should be treated as an unlisted system.
FD requires that a nodelist be present whereas FM and the Terminal
can both be used without one, if so required. The typical FidoNet
nodelist contains over 10.000 systems and has a fairly straight
forward structure as follows.
Zone Usually a large geographical area, such as North America,
Europe, Australia and New Zealand, etc. At the time of
the release of this package, the following FidoNet Zone
numbers have been allocated:
1 North America (including Canada)
2 Europe
3 Australia, Tasmania, and New Zealand
4 Latin America
5 Africa
6 Asia
Region Usually a somewhat smaller geographical area, such as a
country or part of a (large) country. A collection of
regions make up one zone.
Net Usually a collection of systems local to each other.
Typically a city and in some cases including its suburbs.
A collection of nets make up one region.
Node A single system within a net.
Point A single system belonging to a node. Typically, a point
is similar to a user logging on to a BBS system using
his/her terminal program, with the main difference being
that a point performs most of his/her activities offline
and use smart software to collect and transit his/her
mail.
5.1 Hosts and hubs
The coordinator of a net is called the host or NC for Network
Coordinator. The host is responsible for maintaining the nodelist
segment for his/her net and to act as an inbound NetMail gateway
for the systems in his/her net ("host routed mail").
In a large net, it is quite common that "sub-hosts", called hubs,
are set-up to aid in mail distribution within the net. In other
words, a hub has the same function for systems in a network that
a host has for (remote) systems outside the same network.
31
5.2 Compiling a nodelist
Before FrontDoor can use the information in a nodelist, it must
be compiled with the FrontDoor Nodelist Compiler, FDNC hereafter.
FDNC will process the specified nodelist file(s) and generate
database information and index files.
The nodelist that FDNC needs to process is often referred to as
the raw nodelist. It should not have been processed by Xlatlist,
Parselst or a similar utility; but only be the nodelist you
receive each week (if you are a FidoNet node) from your host.
Grab a somewhat recent version of a nodelist and decompress it.
Place the resulting file (such as NODELIST.228) in the NODELIST
directory. Create a file called FDNODE.CTL with your favorite
text Editor and place it in the same directory. You can also use
the sample file included in the FrontDoor distribution package
and modify it to suit your needs.
5.2.1 FDNODE.CTL
FDNODE.CTL is FDNC's control file. It is used to control how
FDNC processes the nodelist files, for dial translation and
cost calculation. The order of commands does not matter. All
commands are case insensitive.
POINTLIST <FILENAME> [BOSS]
This option allows you to add points to your nodelist
database. The optional BOSS address is required if FILENAME
does not contain a BOSS entry and should not be specified if
FILENAME contains a BOSS entry.
If you only have one file with point entries, you can name it
FDPOINT.PVT. FDNC will automatically use this file if it is
found in the NODELIST directory. If you use one or more
POINTLIST statements, FDNC will merge all specified files
into FDPOINT.PVT, overwriting its contents. A separate
chapter discusses the point concept.
PVTLIST <FILENAME> [ZONE]
Similar to the POINTLIST command, but FILENAME contains one
or more regular nodes. The optional ZONE number is required
if FILENAME does not contain a ZONE entry and should not be
specified if FILENAME contains a ZONE entry. The optional
ZONE number is only supported for the first PVTLIST
statement. FDNC accepts the POINT keyword in private
nodelists.
32
If you only have one file with additional node entries, you
can name it FDNET.PVT. FDNC will automatically use it if it
is found in the NODELIST directory. Note that if you use one
or more PVTLIST statements, FDNC will merge all specified
files into FDNET.PVT, overwriting its contents.
Note that FILENAME for POINTLIST and PVTLIST may contain
wildcard characters (* and ?). FDNC will use the most recent
(by comparing the timestamp of the matching files) file.
SWEPULSE
This command was added to handle the somewhat screwed up
method Swedish pulse exchanges handles dialing. Most modem
manufacturers uses the British standard for pulse dialing,
which is not compatible with Swedish pulse dialing. If you
use SWEPULSE in FDNODE.CTL, telephone numbers will be
properly translated. Do NOT use this command unless you live
in Sweden and have to use pulse dialing.
PHONE <ADDRESS> <NUMBER>
Some systems are listed as PVT (private) in the nodelist, in
which case there is no telephone number available (the text
-Unpublished- is used in place). This, of course, means that
FD cannot call a system listed as PVT. If you have the phone
number of a PVT listed system, or wish to override the
telephone number listed in the nodelist, you can use the
PHONE command.
ADDRESS is a fully qualified address (eg. 2:270/17). NUMBER
is an untranslated (raw) telephone number (eg. 352-355-936).
If the PHONE command is used, FDNC will remove possible DOWN,
HOLD and PVT flags for the specified system.
USE ZONE <ZONE>[<ZONE> <ZONE>..]
This command controls which zones FDNC should include in the
nodelist and username index files. The default is to include
all encountered zones. This does not affect the contents of
raw nodelist files, only what information ends up in the
nodelist and username index files.
DIAL <NATL PREFIX>/<SUFFIX> <INTL PREFIX>/<SUFFIX>
Indicates the start of the dial translation table. All four
parameters are optional and are only used if no other
translation applies for a telephone number.
33
If you only want to use a national (NATL) prefix/suffix, you
must specify the / character for the international (INTL)
prefix/suffix to indicate no special treatment. The same
applies if you only want to use an INTL prefix/suffix.
; prefix
; prefix/suffix
; /suffix
;
DIAL / 00 ; Add INTL prefix to all INTL
; numbers.
352- ; Strip country code
61- 0061-/X2 ; Send "X2" to HST for Australia
46-8 /391 ; Append (suffix) 391 to all
; numbers in Stockholm Sweden.
END
END is required to terminate the dial translation table.
If you need to strip the search value from a number, you do
not have to put anything after it. In other words, if you
need to strip 1-305-596 from all number, you enter that
string with no translation. Comments are ignored and must be
preceded by a semicolon.
DIAL 12345-1- 00
..
..
END
Would add (prefix) 12345-1- to all NATL numbers not otherwise
translated. It would add (prefix) 00 to all INTL numbers not
otherwise translated.
DIAL /2222 00/1111
..
..
END
Would append (suffix) 2222 to all NATL numbers not otherwise
translated. It would add (prefix) 00 and append (suffix) 1111
to all INTL numbers not otherwise translated.
The translation values (strings) does not have to contain
number characters (0-9,.-). They can include commands such as
"S25=100" etc. as long as your modem supports it.
34
COST <NATL COST> <INTL COST>
Indicates the start of the cost table. The two (default)
parameters are NOT optional. The default cost only applies to
numbers with no matching entry in the cost table.
COST 5 125 ; NATL default=5, INTL=175
1- 75 ; Canada and the US
1-808- 125 ; Hawaii
46- 27 ; Sweden
END
An additional parameter can be added after the cost for a
number entry indicating the maximum baud rate used. This is
useful when calling locations with a lot of line noise etc.
Please note that this does not work with several high-speed
modems such as the US Robotics Courier HST. You cannot force
a HST modem to connect at 2400 with another HST modem by
changing the baud rate.
To compile your nodelist, type FDNC and press <Enter>, or invoke
the nodelist compiler from FD's main menu, <Alt-N>.
When FDNC is started, it will compare the date of the raw
nodelist and its index files. If the dates match, and no update
has been made to FDNODE.CTL, no compilation will be made and the
program will ask "Nodelist files are up-to-date, compile
anyway?".
If you want to force compilation, run FDNC with the /F command
line switch.
5.3 Nodelist flags
Most of the system entries in the nodelist contain one or more
capability flags to indicate the system's capability. These are a
few of the flags and their meaning:
CM System accepts mail 24 hours a day.
MO System does not accept human (BBS) callers.
V32 CCITT V.32 capable modem.
V32B CCITT V.32bis capable modem (implies CCITT V.32
capability).
V42 LAP-M error correction w/fallback to MNP 1-4.
V42B LAP-M error correction w/fallback to MNP 1-5.
HST US Robotics HST modem (implies MNP capability).
MAX Microcom AX/96xx series modem.
PEP Capable of supporting the Packet Ensemble Protocol
(PEP).
XA Bark and WaZOO file/update requests (all systems
using FrontDoor 2.01 or above should have this).
35
5.4 Command line switches
/C Compile the nodelist if it (or FDNODE.CTL) has
been updated since the last time it was compiled,
otherwise exit directly. This is useful for
compiling the nodelist in batch files since it
avoids the "Nodelist files are up-to-date,
compile anyway?" prompt.
/F Forces FDNC to compile the nodelist regardless of
whether or not it has been updated.
36
5.5 Points
As mentioned before, a point is similar to a user logging on to a
BBS system using his/her terminal program, with the main
difference being that a point performs most of his/her activities
offline and use smart software to collect and transit his/her
mail.
A point system is addressed by specifying the BOSS system's
address followed by the point number. Eg. 2:270/17.1 is point one
of 2:270/17. The BOSS system is called point zero (2:270/17.0),
but the .0 is normally left out.
FrontDoor is a point smart software package and fully supports
the "four-dimensional" (zone, net, node, point) addressing
method. FrontDoor also supports the "two-dimensional" point
approach used by software like BinkleyTerm and oMMM. This is
often called the "fakenet" or "pointnet" method. "Fake" because
the software uses a non-existent network number to identify its
"pointnet" and uses the node field for the point number.
The maximum number of points any system can have is 65,535, not
counting the BOSS, or point zero.
5.5.1 Pointlist
A pointlist is similar to a normal nodelist, with the
exception that all entries are considered point systems.
FrontDoor, by default, uses the file FDPOINT.PVT to store its
pointlist. It is possible to add points of other systems to
your pointlist. This will allow you to enter messages to
other systems' points just like you would to any other
system.
Here is a sample FDPOINT.PVT:
,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
,2,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
As you can see, a point list looks very much like a raw
nodelist. The last field contains nodelist flags (HST, MO,
CM, etc.) and if more than one flag is present, they are
separated by commas.
37
Points can also be added to systems in the master nodelist by
using the POINT keyword:
,7,AES_Sales,Oetrange_L,Tomas,352-355-936,9600,CM,XA,HST,V32B
Point,1,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
,17,AES_Labs,Oetrange_L,JoHo,352-355-937,9600,CM,XA,HST,V32B
Point,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
Assuming this was listed under the Net-270 host in zone two,
we have created 2:270/7, 2:270/7.1, 2:270/17, and 2:270/17.1.
The second example works well if your nodelist is not updated
frequently (weekly, daily, etc.). But if you have to add the
"Point,#" every time you get a new nodelist, this task
becomes rather tedious.
FrontDoor therefore supports an additional pointlist format:
Boss,2:270/7
,1,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
Boss,2:270/17
,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
This does away with the need to constantly update the BOSS
system's data in the raw nodelist and allows you to put your
pointlist in a separate file. FDNC will then take the BOSS
system's data from the master nodelist.
5.5.2 FDNODE.CTL
If you only have one file with point definitions, you can put
them in FDPOINT.PVT and use the third example (above) to add
points for other systems, or your own system. If you have
more than one file with point definitions, however, you
should NOT name any of them FDPOINT.PVT.
Assume we have two files with pointlists:
FDHQ.PTS:
;
; Pointlist for 2:270/17
;
Boss,2:270/17
,1,The_Lab,Oetrange_L,JoHo,-Unpublished-,9600
,2,Marketing,Oetrange_L,Tomas,-Unpublished-,9600
38
and
SCOTT.PTS:
;
; Pointlist for 135/990
;
Boss,1:135/990
,1,ScottPoint,Miami_FL,Scott_Samet,-Unpublished-,9600
We would tell FDNC to merge these two files into FDPOINT.PVT
before it compiles the nodelist, by specifying the following
in FDNODE.CTL:
pointlist C:\FD\NODELIST\SCOTT.PTS
pointlist C:\FD\NODELIST\FDHQ.PTS
The BOSS statement in FDHQ.PTS and SCOTT.PTS can be removed
if you instead specify:
pointlist C:\FD\NODELIST\SCOTT.PTS 1:135/990
pointlist C:\FD\NODELIST\FDHQ.PTS 2:270/17
You must ALWAYS specify the address of the BOSS system (as
shown above) if it is not listed in the actual pointlist
file.
5.5.3 Point handling
A point system is treated just like any other system with one
exception. A point system of another system than your own is
always treated as its BOSS (or point zero) system. When the
Mailer creates mail packets for 1:135/990, it includes mail
for any points under it by default.
5.5.4 Remapping
If you have points that uses "point dumb" software, ie. which
does not support the "four dimensional" (zone, net, node,
point) concept fully, you must instruct FrontDoor about this.
Since FrontDoor supports the "four dimensional" concept, it
has to remap mail from and to "point dumb" software.
39
5.5.5 POINTNET
If the POINTNET environment variable is set, mail from and to
systems with the same net number as the value of POINTNET is
remapped.
Eg. AUTOEXEC.BAT:
SET POINTNET=1004
Would force FD and FM to remap mail from and to 1004/1,
1004/2, 1004/3, and 1004/4 to 2:270/17.1, 2:270/17.2,
2:270/17.3, and 2:270/17.4; assuming your network address is
2:270/17.
FD automatically remaps messages that it extracts from mail
packets. If you use the POINTNET variable, FD will treat
1004/1 identical to 2:270/17.1; assuming your network address
is 2:270/17.
5.6 Sharing the nodelist
FM, FD, and the Terminal are all capable of using the nodelist
together with another program that supports sharing of the
FrontDoor nodelist. If you are running FrontDoor under DESQview
or LANtastic, for example, it is possible to run FD at the same
time as FM, sharing the same nodelist.
When FDNC compiles the nodelist, you must, however, make sure
that no other program (including text editors) is using any of
the nodelist files (FDPOINT.PVT, FDNET.PVT, and/or the raw
nodelist).
40
6 Modems and FOSSIL drivers
FrontDoor works with several modems, including US Robotics HST and
HST/DS, Telebit's Trailblazer, ANC, Everex and Hayes. The general
rule is that the modem must be able to send alphanumeric result
strings. For most modems, the basic configuration is all that is
required. For high speed modems such as the HST, a few extra settings
are necessary.
To utilize your modem in the most efficient way, it must be properly
configured for use with FrontDoor. Most modems are incorrectly
configured for use with FrontDoor when they leave their factory.
FrontDoor require that your modem can return verbal result codes,
such as "CONNECT 2400" and "NO CARRIER". In addition, if you want
FrontDoor to answer the telephone on inbound calls, the modem must be
able to return a verbal code indicating a ring signal, such as
"RING". The modem must not have CD (carrier detect) forced. It should
support disconnecting by lowering DTR (data terminal ready), but it
is not necessary. DTR must not be forced.
For high speed modem users, it is usually recommended that you lock
the DTE (computer<>modem) speed to the highest possible baud rate;
which is usually 19.2 or 38.4 KBPS.
The current version of FrontDoor does not support manually operated
modems with fixed speeds since most of them do not send any type of
messages to the terminal (program). This is expected to be
implemented in future versions.
6.1 Basic configuration
The modem options are located in FDSETUP under the MODEM pull-
down menu. There are four sub-menus, Hardware, Messages, Command
strings, and Answer control.
6.1.1 Hardware
The Hardware option screen allows you to configure things
like the highest baud rate supported by your modem, the COM
port to which your modem is connected, etc.
Modem port The COM port your modem is attached to (1-8).
Maximum baud rate
The maximum supported baud rate of your modem
(300-38400 BPS). If you have locked your
FOSSIL driver (discussed later), set this to
the same speed as the speed you locked the
FOSSIL driver at.
41
Lock port Whether or not you have locked the FOSSIL
driver's baud rate.
Reset modem to connect speed
---------------------------------------------
This option should ONLY be used if you have a
modem that supports the CCITT V.23 (split
speed, 1200/75 and 75/1200) recommendation.
---------------------------------------------
Lower DTR when busy
Determines how the Mailer (FD) should handle
the modem when it invokes other programs,
exits and shells to DOS. If enabled, the
Mailer will simply lower DTR. This means that
your modem will not answer the phone, but any
calling systems will not get a busy signal.
If you disable this, the Mailer (FD) will
send the Offhook string to the modem instead
of lowering DTR. This can be used to take the
modem offhook when your system is not
available so that calling systems gets a busy
signal instead of no answer.
---------------------------------------------
It is against the law of some countries to
take a modem offhook unless actual
communication is taken place. As the operator
of FrontDoor, it is your responsibility to be
aware of such laws in your own country.
---------------------------------------------
Lower DTR to terminate call
If enabled, the Mailer (FD) will drop DTR for
a short period of time to terminate calls.
Most modems supports this and you should only
disable it if your modem does not support
lowering of DTR.
If disabled, the Mailer (FD) will send the
Escape code string followed by the Onhook
string to terminate a call.
Toggle DTR before dialing
Specifies that the Mailer (FD) should lower
DTR, pause, and then raise DTR again every
time it places an outgoing call.
While this increases the chances of call
collision, it may be required by some modems
to reset properly, etc. Do not enable this
option unless it is absolutely necessary.
42
Carrier detect mask (CDMASK)
The bitmask the Mailer (FD) should use when
asking the FOSSIL driver for the port status
to determine if a carrier signal is still
present. The default is 128 and cannot be
changed in the noncommercial version.
6.1.2 Messages
This option allows you to define the messages sent by your
modem. If your modem does not send one or more of the strings
you should NOT remove them.
The 300 string is sent as CONNECT followed by a carriage
return by some modems (US Robotics Courier HST for example).
You should therefore set the string to CONNECT| (the pipe
character will be replaced with a CR by the Mailer) if this
is the case with your modem.
The RING string should be set to RING| (the pipe character
will be replaced with a CR by the Mailer) if your modem sends
the RINGING message while waiting for a call to be connected.
6.1.3 Command strings
All command strings may contain a pipe (|) character, which
translates into a CR and a tilde (~) character which
translates into a one second pause.
Escape code Used to place the modem in command (as
opposed to data/on-line) mode. This is only
used if you have disabled "Lower DTR to
terminate call" or if you are using the
"Reset modem to connect speed" option.
Return on-line Used to place the modem in data/on-line (as
opposed to command) modem. This is only used
if you are using the "Reset modem to connect
speed" option.
Onhook Used to place the modem on hook (as opposed
to off hook) if you have disabled "Lower DTR
when busy" or "Lower DTR to terminate call".
Offhook Used to place the modem off hook (as opposed
to on hook) if you have disabled "Lower DTR
when busy".
43
Dial Used when the Mailer places an outgoing call.
The Mailer will send the dial (this) string,
the Prefix, the telephone number, followed by
the Suffix.
Ie. <Dial><Prefix><Number><Suffix>
Prefix Sent before every number when the Mailer
places an outgoing call (see above).
Suffix Sent after every number when the Mailer
places an outgoing call (see above). This
should be set to the pipe (|) character to
indicate a CR in most cases.
Delay The delay (in 1/10 second) between every
string the Mailer sends to the modem. If you
have an extremely fast modem (not baud rate),
such as the USR HST, you can set this as low
as one or two, but most modems require that
this is set between four and eight.
Init-1..Init-3 Modem initialization strings. They are sent
every time the Mailer initializes the modem
in order (Init-1, Init-2, Init-3). Unused
strings should not be set to anything (leave
field blank).
Down Sent to the modem when the Mailer terminates.
This occurs when mail has been received or
when you press <Alt-Q> (Quit).
Reset Sent to the modem to force it to respond with
an OK message. This should be set to "AT|" in
most cases.
6.1.4 Answer control
Manual answer Defines that the Mailer should wait for the
RING message from the modem and then send the
force answer string (below) to force the
modem to answer.
This is the safest way to control modem
answering and should be used unless your
modem does not support it. For Hayes
compatible modems, you should add S0=0 to one
of your init strings to prevent the modem
from answering automatically.
44
Force answer The string forcing the modem to answer an
incoming call. This should be "ATA|" in most
cases.
Answer delay When the Mailer receives the RING message
from the modem, it will pause for nn 1/10
seconds before sending the force answer
string. This should be set between four and
eight for most modems.
Limited hours
Starting time
Ending time Allows you to force the Mailer to ignore the
RING message outside the specified hours.
This is useful if the telephone line is
shared by other people during daytime but
available during the night for example.
6.2 Advanced configuration
Many modems have several different connection modes and options.
The US Robotics HST Dual Standard, HST/DS hereafter, for example
can be configured between several different connect modes,
including CCITT V.32, CCITT V.32bis, and the proprietary HST
protocol.
Since the nodelist can list a system's hardware (modem)
capabilities, the Mailer (FD) can automatically reconfigure your
modem depending on what type of hardware the remote system (to be
called) is using. This automatic reconfiguration feature can also
be used to disable or enabled certain options for individual
systems (ie. not based on a system's capabilities) because of
problems with to noisy lines, long satellite delays, etc.
This is all configured in the MODEM MANAGER under the Manager
pull-down menu in FDSETUP. The actual data is stored in a file
called MODEM.FD in the SYSTEM directory.
6.2.1 The Modem Manager
The entries are processed as defined, ie. in sequential
order. It may be important in which order these options are
configured and triggered, the modem manager therefore allows
you to re-arrange individual entries by using the "F2-Move"
option.
"String to match" is either a nodelist flag, such as HST, or
a complete network address, such as 2:270/17, that the Mailer
(FD) should match in order to send the specified string.
45
"String to send" is the string that will be transmitted to
the modem when a match is made.
The Mailer (FD) will ignore entries with INACTIVE status.
6.2.2 An example, the HST/DS
Most HST/DS owners will have the following three lines at the
beginning of their MODEM MANAGER list:
V32 ATB0|
HST ATB1|
V32B ATB0|
The first line, V32, will transmit "ATB0" followed by a
carriage return (ASCII 13) to the modem if the system to be
dialed has V32 in its nodelist flags. This is to enable the
HST/DS' CCITT V.32 handshake.
The second line, HST, will transmit "ATB1" (followed by a
carriage return) to the modem if the system to be dialed has
HST in its nodelist flags. This is to tell the modem that we
prefer the HST protocol. In the case of a system with both
the V32 and the HST flag, we want the HST flag, because that
protocol is faster than the CCITT V.32 protocol.
The third line, V32B, will transmit "ATB0" to the modem if
the system to be dialed has V32B in its nodelist flags. This
it to tell the modem that we prefer the CCITT V.32bis
protocol. In the case of a system with both the V32B and the
HST flag, we want the V32B flag, because it is easier to get
a good modem handshake over noisy phone lines and because
CCITT V.32bis is 14.4 KBPS in both directions (full-duplex).
Let us assume our modem has a problem, with incorrect busy
and voice signal detection, when it encounters a modem that
answers using PEP (Telebit Trailblazer is such a modem), we
would then want to disable our modem's capability to detect a
busy signal and/or a voice signal. We would then add:
PEP ATX2|
to the MODEM MANAGER.
46
6.3 Some sample configurations
US Robotics HST (older models)
DIP Switches:
0 (big)=OFF, 1=OFF, 2=OFF, 3=ON, 4=OFF, 5=ON, 6=OFF, 7=OFF,
8=ON, 9=ON, 0=OFF.
Command/modem strings:
CONNECT 300 CONNECT|
RING RING|
OffHook ATH1|
OnHook ~ATH0|
Init-1 AT&G2&K0&M4S19=2B&B1&H1&R2&N0
S15=72|
Init-2 ATV1X4S7=55EQM0S11=50S0=0|
Down AT|
Reset AT|
Modem hardware:
Lock port YES
Baudrate 38400, 19200 or 9600
Reset modem to connect speed NO
Lower DTR when busy YES
Lower DTR to terminate call YES
Toggle DTR before dialing NO
Answer control:
Manual answer YES
Force answer ATB0A|
Delay 4
47
US Robotics HST/DS/V.32bis
DIP Switches:
0 (big)=OFF, 1=OFF, 2=OFF, 3=ON, 4=ON, 5=ON, 6=OFF, 7=OFF,
8=ON, 9=ON, 10=OFF.
Command/modem strings:
CONNECT 300 CONNECT|
RING RING|
OffHook ATM0H1|
OnHook ~ATM1H0|
Init-1 AT&K0&M4S19=2&B1&H1&R2&N0E0Q0
B1&G2|
Init-2 ATV1X4S7=55M1S11=50S10=40S15=
72&A3|
Init-3 ATS0=0H0|
Down <empty>
Reset AT|
Modem hardware:
Lock port YES
Baudrate 38400, 19200 or 9600
Reset modem to connect speed NO
Lower DTR when busy YES
Lower DTR to terminate call YES
Toggle DTR before dialing NO
Answer control:
Manual answer YES
Force answer ATB0M0A|
Delay 4
In the MODEM MANAGER in FDSETUP:
V32 ATB0|
HST ATB1|
V32B ATB0|
48
6.4 FOSSIL drivers
A FOSSIL (or Fido/Opus/SEAdog Standard Interface Layer) driver is
a memory resident program that works as a layer between the
application program and your computer's hardware. The Mailer (FD)
requires a FOSSIL driver to function. One of the advantages of
the standard FOSSIL interface is that programs can be ported
easily to other machines and/or operating systems.
There are several FOSSIL drivers available. The Mailer (FD) has
been tested with OpusComm, X00, and BNU with good results. X00
and BNU will be described here.
6.4.1 BNU
BNU, written by David Nugent, comes in two flavors. One is a
device driver, similar to X00.SYS. The second flavor is a
.COM file, loaded from AUTOEXEC.BAT or another batch file.
The .COM flavor is assumed in the example. For a detailed
description of the BNU driver, please refer to the
documentation included in the BNU distribution archive.
[AUTOEXEC.BAT]
BNU /R=1024 /T=512 /L1:38400
/R=1024 Specifies a receive buffer of 1024 bytes.
/T=512 Specifies a transmit buffer of 512 bytes.
/L1:38400 Locks COM2 at 38,400 BPS (for use with the 14,400
HST or HST/DS modems).
If you are not using a high-speed modem the above example
should most likely be modified to not lock COM2.
6.4.2 X00.SYS
X00, written by Ray Gwinn, is a device driver (later versions
can also be loaded as an executable from AUTOEXEC.BAT), it is
loaded from your CONFIG.SYS file when your machine is
started. For a detailed description of the X00 driver, read
the documentation included in the X00 distribution archive.
[CONFIG.SYS]
device = X00.SYS E 1 B,1,38400 T=512 R=1024
E Disable 5 second advertisement when X00 is first
loaded.
49
1 Number of COM ports X00 should allow to be
accessed at one time.
B,1,38400 Locks COM2 at 38,400 BPS (for use with the 14,400
HST or HST/DS modems).
T=512 Specifies a transmit buffer of 512 bytes.
R=1024 Specifies a receive buffer of 1024 bytes.
If you are not using a high-speed modem the above example may
not be what you want. The most common command line for X00
is:
device=X00.SYS E 1
50
7 Events
There are two basic types of events. Mail events and external events.
Mail events are used to control how the Mailer (FD) treats mail
during a given time of the day. External events are used to force the
Mailer to terminate with an errorlevel at a specific time. They can
be used to run system maintenance programs, disk optimizers, etc.
The EVENT MANAGER in FDSETUP is used to control mail and external
events. There is a (required) global event, which is active when no
other event is active. The @ character is used for the global event.
7.1 The Event Manager
The event manager has two modes. The first is the view mode,
which is self explanatory. The second mode is the edit/create
mode. It will now be described.
Tag (T) The event "ID". A letter from A-Z or @. The @
event has special meaning and is described later.
X is used for eXternal events, all other letters
are used for mail events. Which letter you use is
not important. They could correspond with the
time of day, N for Night, E for Evening, D for
Day, etc. The event tag is used to associate an
event with a schedule block in the route file
(see "Mail routing").
Days The days you want the event to be active on. The
@ event is active on all days.
Modifier (M) You can define a start time for the @ event. It
is not used to control the start of the @ event.
It can be added, subtracted, or ignored, when
calculating the actual start time of other
events.
If the modifier for an event is +, the start time
of the @ event is added to the start time of the
event.
If the modifier for an event is -, the start time
of the @ event is subtracted from the start time
of the event.
If the modifier for an event is *, the start time
of the @ event is ignored and not used to
calculate the actual start time of the event.
This is very useful when it is time to switch
between winter and summer time. Instead of having
to manually go into each event and define a new
start time, you could change the start time of
the @ event and the start time of all other
events will be changed.
51
Let us assume that you have an event (tag=E) that
starts at 08:00 in the morning with a modifier of
+. Your @ event has a start time of 01:00. Since
the modifier was + (add), the start time of @
(01:00) will be added to the start time of the E
event and the result will be that event E starts
at 09:00. If you change the modifier to -
(subtract), the start time of event E will be
07:00 (08:00 minus 01:00). If you set the
modifier to * (ignore), the start time of E is
not affected.
Start time Defines the start time of an event. See Modifier
(above) for an explanation on how this can be
affected.
Length Defines the length of the event. External events
(X) always have a length of 00:01 (one minute).
Errorlevel
For external (X) events, this defines the
errorlevel that the Mailer (FD) will terminate
with.
For mail events, this defines the errorlevel to
exit with if mail is received (and the Mailer is
triggered to exit). If the errorlevel field is
set to zero, the default MAIL RECEIVED errorlevel
will be used.
You may use any value in the range 31-255.
Min.cost Defines the minimum cost of messages that should
be qualified (see "Mail routing").
Max.cost Defines the maximum cost of messages that should
be qualified (see Mail Routing). A value of -1
forces FD to ignore the cost of messages.
Behavior Defines the behavior of the event. Mail events
and external (X) events have different behavior
options, this is described later.
Retry delay
Defines the delay (in seconds) the Mailer should
wait between placing outgoing calls. A value of
zero means that you want the Mailer to use the
default delay (described earlier).
7.1.1 External event behavior
Allow users during event
Defines whether or not non-mail (human) calls are
allowed to interrupt the event.
52
If a non-mail call comes in at 12:00 and you have
an external (X) event scheduled for 12:30, the
Mailer will take the X event into account when
calculating the number of minutes left until the
next event, depending on how this option is set.
If it is disabled, the user would, in this case,
only have 30 minutes until the next event. If it
was enabled, the Mailer would instead scan ahead
for the next (if any) event that does not allow
users.
Forced Defines whether or not the event is forced. The
Mailer, by default, ignores events that it
"missed" while doing something else. If you
enable this option, the event will be executed
even if the Mailer have "missed" it.
Assume you have a non-forced external (X) event
scheduled for 12:00 and a user calls in at 11:50.
The call lasts for 30 minutes (12:20). When the
Mailer is brought back up again, the external
event will not be executed. If, however, you had
this option enabled for the external (X) event,
it would be executed as soon as the Mailer was
brought up again.
Inactive Toggles the state of the event. The Mailer will
ignore any inactive events. This allows you to
deactivate events without removing them from the
event manager.
7.1.2 Mail event behavior
Allow users during event
This has the same function as for external (X)
events. In addition, if this option is set to
"NO" (disabled), non-mail calls will not be
accepted during the duration of the event.
Exit when mail is received
Defines whether or not you want the Mailer to
exit when mail has been received. This allows you
to process received echomail, etc.
High priority (crash) mail only
Forces the Mailer to ignore messages that does
not have crash status. Note that messages with
IMM (Immediate) status are not affected by this.
Allow file requests
Defines whether or not you want the Mailer to
honor file requests during an event. If you
disable this option, the Mailer will simply
ignore file requests.
53
Pickup file requests
The Mailer will by default not accept file
requests received during an outgoing (outbound)
mail call since you are paying for the call. This
option allows you to pickup waiting file requests
and process them. Whether or not they are
actually honored is defined by the Allow file
requests option.
Hold (do not send) file requests
Forces the Mailer to ignore outgoing (your own)
file request messages during the event. This is
useful if you do not want to send out file
requests during daytime events for example.
Attempt to pickup waiting mail
Defines whether or not you want the Mailer to
pickup any waiting mail on outgoing calls. The
default (Yes) should be used unless you want the
Mailer to terminate the mail session as soon as
it has delivered its mail. If this option is
disabled, your file requests (if any) will fail
since the Mailer terminates the call before the
remote system has a chance to process them.
Allow nodes to pickup waiting mail
This option is the same as using the DENY route
command (see "Mail routing").
The only difference is that you cannot be
selective about which systems can pickup waiting
mail. If a system calls in to deliver its mail
and this option is disabled (NO), your system
will not release (send) any waiting mail.
Prioritize outbound calls
Forces the Mailer to make outgoing calls without
waiting for the specified time (retry delay,
etc.) between calls. The Mailer will still accept
incoming (inbound) mail, but the chances of
another system getting through are very small.
Receive-Only
Specifies that you do not want the Mailer to make
any outgoing calls during the event.
End event when no more mail to send
If you have an event with some restrictions on
other systems or do not allow users, it may be
useful to enable this option, forcing the Mailer
to release all restrictions enforced by the event
as soon as there is no more mail to send.
If new mail is entered that qualifies for mailing
and the event has ended (prematurely), it will be
restarted.
54
Send to CM systems only
Forces the Mailer to only qualify those systems
that have the CM (continuous mail) flag set in
their nodelist entry.
Send to non-CM systems only
Forces the Mailer to only qualify those systems
that Do not have the CM (continuous mail) flag
set in their nodelist entry.
Only execute event once
Forces the Mailer to only deliver mail to a
system once during the event. If the event is
interrupted or aborted, the Mailer will remember
which systems it has already delivered mail to
and when the event is restarted, it will not call
those systems again.
Assume you have mail to 1:135/20 and 2:310/11
during event A, with this behavior enabled. On
the first call to 1:135/20, the Mailer sends its
mail successfully. If the event is restarted for
some reason (user break, human caller, mail
receive exit), the Mailer will not call 1:135/20
again, even if there is new mail for that system.
Inactive The same as for external (X) events.
7.1.3 The @ event
The @ event is active whenever your system is not in another
mail event. The @ event is required. You do not have to tell
the Mailer to send mail during the @ event, but it must be
defined.
You can use it to send local and/or low cost mail whenever
the Mailer is not busy, etc. You can specify a schedule block
(see Mail routing), using the @ tag and define routing rules
for it just like any other mail event. If the Mailer does not
find a schedule block for the @ tag, it will still use any
global rules defined in the route file.
55
7.1.4 Overlapping events
Overlapping events are fully supported by the Mailer.
Event B starts at 05:00 with a duration of 01:00. Event A
starts at 05:01 with a duration of 00:15. The behavior for
event A includes Only execute event once and End event when
no more mail to send.
Event B will start at 05:00, after one minute, event A will
start and last for fifteen minutes (or end when there is no
more mail to send).
Once event A has ended, B will resume. This is a very
powerful and useful concept. It can be used to start
temporary or dynamic events within events that lasts for
several hours.
56
8 Mailer
The Mailer, FD hereafter, is the core program of FrontDoor. It is
responsible for sending and receiving messages; and optionally pass
human callers to a BBS or other interactive software. The Terminal
function is also located in FD and can be reached from one of its
menus.
Most functions of FD are reached by holding down the <Alt> key and
pressing a key, <A..Z>.
8.1 Menus
Each function and menu of the Mailer will now be described.
8.1.1 Programs <Alt-P>
<Alt-E>
Message Editor Loads FM.
<Alt-J>
Terminal Loads the Terminal (it resides in FD overlay
file, FD.OVR).
<Alt-C>
Configure Loads the FDSETUP program.
<Alt-N>
Nodelist Loads the nodelist compiler (FDNC).
<Alt-K>
User keys Allows you to select one of the 20(24) user
definable functions.
<Alt-Z>
DOS shell Invokes a temporary DOS shell. Type EXIT and
press <Enter> to return to FD.
Packets created with any of the temporary
mail services function (File Request,
Transmit file, Send mail) will be discarded
when you return and FD will re-scan the
contents of the NetMail folder.
<Alt-Q>
Quit Returns you to DOS. FD will return errorlevel
10 (user break).
57
8.1.2 Utilities <Alt-U>
<Alt-A>
Active event Shows the settings for the currently active
event (if any).
<Alt-I>
Inbound history
Invokes the inbound call (mail) history
management function.
<Alt-O>
Outbound history
Invokes the outbound call (mail) history
management function.
<Alt-R>
Recent activity
Shows you the last two days of general
activity, failed sessions, file requests,
number of files/bytes sent and received, etc.
<Alt-X>
Disconnect Allows you to manually terminate a call. This
will also re-initialize the modem.
<Alt-L>
Lock keyboard Allows you to lock the keyboard (and FD)
against unauthorized use. FD will still
perform its duties such as sending and
receiving mail, etc.
You must enter the specified password to
unlock the keyboard. If FD exits (due to mail
received or a BBS call is received), the
keyboard lock status is retained and when FD
is brought back up, the keyboard will be
locked.
Restart event Forces FD to re-scan the message base and
create new mail packets. All previous
temporary packet information is discarded.
8.1.3 Mail <Alt-U>
<Alt-B>
Queue manager Allows you to manipulate the current mail
queue. If no mail event is active, the mail
queue is empty. The mail queue is described
in a separate section.
58
<Alt-V>
Undialable manager
Allows you to manipulate systems marked as
undialable. This is discussed in a separate
section.
<Alt-F>
Forced poll Creates a priority entry in the mail queue
for the specified system. If an entry for the
specified system already exists in the queue,
its status is set to priority. If FD has to
re-scan the message base, the temporary poll
is removed from the mail queue.
<Alt-G>
Request files Allows you to create a temporary file request
to the specified system. If FD has to re-scan
the message base, the temporary file request
is removed from the mail queue.
<Alt-T>
Transmit files
Allows you to transmit files to the specified
system. As with the poll and request function
(above), this is only a temporary function;
if FD has to re-scan the message base, the
entry is removed from the mail queue.
<Alt-S>
Send mail Allows you to create a temporary mail packet
for the specified system. You can choose to
include all or high-priority mail. If FD has
to re-scan the message base, the entry is
removed from the mail queue.
<Alt-Y>
Your profile
Answer Allows you to toggle the manual answer
status. This option is only valid if you have
enabled the manual answer option in FDSETUP.
Note that if you manually toggle this option,
the Mailer will honor the new setting until
it exits.
Printer Allows you to toggle the printing of new
(incoming) messages. This option is not
available in the noncommercial version.
Human callers
Allows you to toggle whether or not you want
FD to accept human callers.
This option is only valid if you are not
running FD in mail-only mode.
59
Exit on mail
Allows you to toggle whether or not FD should
exit when mail has been received. This option
is only valid if an errorlevel for received
mail has been specified in FDSETUP and the
active event (if any) specifies that FD
should exit when mail has been received.
<Alt-W>
Which AKA Allows you to select a different AKA to
operate under. The specified AKA will be
active until FD exits or you select a new AKA
to operate under. Note that this does not
effect the AKA matching function of FD.
8.2 Mail queue <Alt-B>
The mail queue function allows you to modify the status of one or
more mail packets, temporarily change the destination of mail
packets, and to unpack one or more packets.
<F1>
Priority Sets priority status on all selected packets.
Packets with priority status are always processed
before packets with crash or normal status.
<F2>
<Enter>
Verbose Shows more information about the highlighted mail
packet such as attached files, estimated transfer
time, etc. You can not use this function if the
destination system is unlisted (does not exist).
<F3>
Crash Sets crash status on all selected packets.
<F4>
Hold Sets hold status on all selected packets. Packets
with hold status will never be processed by FD
unless the destination system calls in to pickup
mail.
<F5>
Select all Selects all packets.
60
<F6>
Destination Changes the destination of all selected packets.
When FD processes the mail queue, it will treat
all active (non-sent and non-held) packets as
individual packets, including two or more
different packets destined for the same system.
If a connection is made (whether the destination
system calls you or your system calls it),
however, all packets destined for that system
will be sent.
<F7>
Unpack Discards all selected packets (note: NOT MAIL)
from the queue.
<F8>
Clear status Sets normal status on all selected packets.
<F9>
Clear busy retries
Sets the dial attempts for all selected packets
to zero.
<Esc>
Exit Returns you to FD.
<Space>
Select Selects the currently highlighted packet.
8.3 Call progress
When FD has mail to send, it will step through the mail queue and
call the systems with mail packets waiting. Packets with sent,
failed, and hold status are ignored by FD. These can, however,
always be picked up by the destination system if it calls in.
After every unsuccessful (BUSY, NO CARRIER, etc.) call, the busy
retry counter is incremented until it reaches the value defined
in FDSETUP. Once the limit has been exceeded, FD puts hold status
on the packet. If a connection is made but the actual transfer
fails, the resend retry counter is updated and once the limit,
defined in FDSETUP, is reached, FD puts failed status on the
packet.
Press <Space> to force FD to place the next outgoing call.
61
8.4 Semaphore indicators
Every time FD scans the NetMail folder, it looks for unread
messages destined for your system. If any are found, it will
enable the flashing "Mail" text in the bottom right hand corner.
Once the message(s) have been marked received (read), the
flashing mail text will disappear.
8.5 Undialable
When FD reaches the resend (session failure, transmission
failure, etc.) retry limit for a system during an event. That
system is added to the undialable table with a "grade" of one.
When the "grade" reaches three, the system is considered
undialable and FD will never call that system again (until you
manually "upgrade" it).
The undialable manager is accessed by pressing <Alt-V> from FD's
main menu and allows you to "upgrade" a system's status, add a
system manually to the undialable list, and remove one or more
undialable systems.
The undialable system information is kept in NODIAL.FD in
FrontDoor's SYSTEM directory.
62
9 Editor
The Editor, FM hereafter, is the program used to write and read
messages. It can be invoked from the command line in DOS or from FD
by pressing <Alt-E>.
FM has two "status" lines. The bottom status line is used to display
the current message, number of messages in the current folder, the
lowest and highest message numbers and the number of messages
remaining to the last message (last minus current). The top status
line shows the currently active AKA (address), the current time and
the folder you are in.
Most functions of FM are reached by holding down either the <Ctrl> or
<Alt> key and pressing a key, <A..Z>. If you press a key that has no
function in FM, it will display a message saying "Press Alt-M for
menu" on the bottom status line.
Each function and menu of FM will now be described.
9.1 Main <Alt-M>
<Ins>
Create Allows you to create a new message in the current
folder. You will be prompted for the destination
(user name and possibly a network address),
subject, etc.
<Del>
Kill Removes the currently displayed message. FM will
confirm that you really want to remove the
message.
<Alt-R>
Reply Similar to the CREATE function. The destination
of the newly created message, however, is taken
from the sender of the message you are replying
to. This function also allows you to quote the
original message, in whole, or selected parts.
<Alt-N>
Netmail reply Similar to the REPLY function. If you are in a
Local or EchoMail folder, your message (the
reply) will be placed into the NetMail folder.
The destination address of the message is taken
from either the origin line (EchoMail folders) or
the sender's name (Local folders).
63
<Alt-C>
Reply comment Similar to the REPLY function. It allows you to
create a follow-up message with additional
comments to the same destination as the original
message.
This function is not available in the
noncommercial version.
<Alt-L>
<Tab>
Forward This function allows you to redirect a message to
someone else. It will also insert some additional
information at the top of the message, showing
who the message was originally from, etc. You can
choose whether or not you want to overwrite the
original message with the forwarded message.
<Alt-L> will also add the default message status
to the message and remove the Rcvd and Sent
status bits if they were set.
<Alt-F>
Folders Allows you to change the active folder. You
cannot change to another folder while editing a
message, but you can view the folder list. The
type of each folder is shown as 'E' for EchoMail,
'L' for Local and 'M' for NetMail.
The commercial version allows you to configure
any folder with NetMail status, the type will
then be displayed as 'N'.
To select a folder, you can use the arrow keys to
move the highlight bar and then press <Enter>.
You can also type the number of the folder
followed by pressing <Enter>.
<Ctrl-F>
Folder scan Scans all folders and indicates which folders
have any message number higher than the last read
message. Typically, this means that new messages
have arrived in a folder since you last accessed
it.
<Alt-Z>
DOS shell Invokes a temporary DOS shell. Type EXIT and
press <Enter> to return to FM.
<Alt-Q>
Quit Returns you to DOS or to FD, depending on how FM
was invoked. If you are editing a message, you
will be asked whether or not you wish to save it
before exiting.
64
9.2 Edit <Alt-E>
<Alt-S>
Status Allows you to change the status of a message. See
the separate section about Message Status Bits
for a detailed description of this.
<Alt-A>
Subject Allows you to change the subject of a message. If
you have a message with file attaches and press
<Alt-A>, the file attach list will be processed
again and if you specified wild-cards or more
than one file on the subject line, you will have
to select the files you want to send once again.
<Alt-T>
Text Allows you to edit the text (body) of a message.
If you are already in editing mode, this will
bring up a secondary menu with text editing
related functions.
<Alt-D>
Destination Allows you to change the destination of a
message. This will add the default message status
bits as well as the Local bit to the message and
remove the Rcvd and Sent status bits if they were
set.
As opposed to the FORWARD function, using <Alt-D>
will not result in any text being added to the
message body (forwarding info).
<Ctrl-F2>
Toggle Brings up the toggle menu.
9.2.1 <Alt-T> in edit mode
<Alt-F2>
Import file
Allows you to import an ASCII file into the text.
The contents of the file will be inserted at the
current cursor position.
<Ctrl-Enter>
Insert line
Inserts a blank line after the current line. The
cursor will remain in the same position.
65
<Ctrl-B>
Line to buffer
Adds the current (where cursor is positioned)
line to end of the temporary buffer and moves the
cursor down one line. The last eighty lines of
deleted/marked text is always retained in a
temporary buffer and can be reinserted with
<Alt-F1> or <Esc>.
<Ctrl-W>
Delete word
Deletes the word to the right of the cursor.
<Ctrl-G>
Go to line#
Allows you to specify an absolute line number to
place the cursor on.
<Ctrl-T>
Delete to EOF
Deletes all text from cursor to end of message.
<Alt-F5>
Find Searches for the specified string, and if found,
places the cursor on the first character of the
found word.
<Alt-F6>
Find & Replace
Allows you to replace a string with another. Note
that this function will restore the cursor
position (the find function will not).
<Alt-F8>
Re-format Reformats a block of text (from cursor to the
next blank line) and removes any hard CRs from
the reformatted lines. It will add a hard CR to
the end of the reformatted block.
<Alt-F4>
Line drawing
Allows you to draw lines and boxes using a
variety of line sets.
This is not available in the noncommercial
version.
<Alt-F1>
<Esc>
Undelete Inserts the last deleted line at the current
cursor position. The last eighty lines of
deleted/marked text is always retained in a
"scratch" buffer.
66
<Alt-F10>
<Ctrl-Z>
Save & Exit
Save (or discard changes to) the current message.
9.2.2 Toggle menu <Ctrl-F2>
<Ctrl-X>
Translation tables
Toggles the state of the translation tables.
<Ctrl-C>
Hard CRs Toggles whether or not hard CRs in the message
text should be displayed.
<Ctrl-E>
Echo info Toggles the state of the echo info. This function
is only available in echomail folders.
9.3 Utilities <Alt-U>
<Alt-F9>
Management Invokes the management function.
<Alt-J>
Move/copy Allows you to move/copy the current message to
another folder.
<Alt-V>
Message to file
Exports the current message to an ASCII file. If
the specified file already exists, you will be
asked if you want to overwrite its contents or
append the message to the end of the file.
<Alt-I>
Print message Adds the current message to the print queue.
Messages added to the queue are printed in the
order they were added. If you attempt to leave FM
while messages are still being printed, it will
ask you to confirm your choice to exit. If you
choose to exit, FM will cancel the remaining
messages in the print queue.
FM does NOT use any external print spooler, such
as DOS' PRINT program.
<Alt-B>
Renumber Renumbers the messages in the current folder so
that there are no gaps in the numbering. This
function is not available in Hudson Message
Base-type folders.
67
<Alt-G>
Change username
Allows you to change the current user profile.
<Alt-W>
Change address Allows you to change the active network AKA
(address). This will also change the address that
is inserted in origin lines in EchoMail folders.
<Alt-O>
Change origin Allows you to change the active origin line.
Whether or not an origin line is appended to
messages that you create is determined by the
echo info setting (EchoMail folders only).
<Alt-X>
Show notes Displays extended information (hidden behind ^A,
ASCII 1, characters) in a message.
9.4 Purge <Alt-P>
The options on the Purge menu allow you to remove one or more
messages, in the current folder, based on the various criteria,
as described below.
From user Purge all messages FROM the specified user.
To user Purge all messages TO the specified user.
From net address
Purge all messages that originated from the
specified address.
To net address Purge all messages destined for the specified
address.
Received Purge all received (read) messages.
Age Purge all messages older than the specified date.
9.5 Other keys in edit mode
<Left>
<Right>
<Up>
<Down> Moves the cursor.
<Ctrl-Left> Places the cursor at the beginning of the word to
the left of the cursor.
<Ctrl-Right> Places the cursor at the beginning of the word to
the right of the cursor.
68
<Home> Moves to the beginning of the current line. If
the cursor is already at the beginning of the
line, it will be moved to the top of the text
window.
<End> Moves to the end of the current line. If the
cursor is already at the end of the line, it will
be moved to the bottom of the text window.
<PgUp>
<PgDn> Scrolls one page up/down.
<Ctrl-Up>
<Ctrl-Down> Scrolls one line up/down without moving the
cursor. This option is only available for systems
with 101/102 key (extended) keyboards.
<Ctrl-PgUp>
<Ctrl-PgDn> Moves to the beginning/end of the message.
<Tab> Expands to four spaces (or to the next TAB
column).
<Shift-Tab>
(Backtab) The opposite of Tab. Moves the cursor four spaces
back (or to the previous Tab column). If the
cursor is already at the beginning of the line,
no action is taken.
<Ins> Toggles insert mode on/off.
<Del> Deletes character under cursor and scrolls the
rest of the line left without moving the cursor.
<Backspace> Deletes character to the left of cursor and
scrolls the rest of the line left, moving the
cursor one step.
<Ctrl-End> Deletes from the cursor to end of line.
<Ctrl-Y> Deletes the entire line.
<Ctrl-U> Changes the case of the current line. Uppercase
characters are converted to lowercase characters
and vice versa.
9.6 Other keys in view (read) mode
<Home> Move to first message in folder.
<End> Move to last message in folder.
69
<Left>
<Right> Move to previous/next message in folder.
<Up>
<Down>
<PgUp>
<PgDn> Scroll message text (line or page).
<Ctrl-PgUp>
<Ctrl-PgDn> Move to beginning/end of message.
<Space> Selects current message as "home" message. Note
that once you switch to another folder, set
"home" message is by default set to the current
message.
<Enter> Returns to home message.
<Ctrl-Left>
<Ctrl-Right> Find previous/next message addressed to current
user.
<->
<+> Move to previous/next message in reply chain.
<Ctrl-Home>
<Ctrl-End> Move to first/last message in reply chain.
<1..9> Go to specified message number.
<Ctrl-Up>
<Ctrl-Down> Move to previous/next tagged message. This
requires that you first use <Alt-F9> (Management)
and select the messages you wish to move between.
9.7 Entering new messages
Press <Ins>. The screen will be refreshed and you will be
prompted for the destination. If you are in the NetMail folder,
you can use the name/address look-up function to specify the
destination of the message; if you are in an EchoMail/Local
folder, you must type the destination manually.
Once you have specified the destination of a message, you will be
prompted for the subject (Re:). If you want to send or request
files to/from another system, select the proper status bits and
specify the file data in the subject line. Note that the default
message status (specified in FDSETUP) is always added, but can be
changed.
Enter the message text and press <Ctrl-Z> or <Alt-F10> to save
the message.
70
9.8 Management <Alt-F9>
The management function is used to perform global operations on a
range of messages such as moving, printing, copying, deleting,
etc.
When you press <Alt-F9> for the first time in a folder, FM will
scan all the messages in the folder and build a list of them.
That list is kept in memory until you press <Alt-F9> in another
folder, or when FM, for some reason, has to rebuild its internal
message list for a folder. If you remove, add or renumber
messages the list will be updated accordingly, so no rescan is
necessary.
9.8.1 Main menu
<Del>
Kill Removes all selected messages.
<F3>
Print messages Prints all selected messages.
<F4>
Range select Allows you to select a range of messages
matching a certain criteria.
<F5>
Select all Allows you to select all messages in the
folder.
<F6>
Move Allows you to move all selected messages to
another folder.
<F7>
Copy Allows you to copy all selected messages to
another folder.
<F8>
Export to file Allows you to export all selected messages to
an ASCII file.
<Enter>
Go to message Returns to view mode and makes the
highlighted message the current message.
<Space>
Select Selects or deselects the current message.
71
<Esc>
Exit Returns you to view mode.
9.8.2 Continuous tagging
If you activate Caps Lock, messages can be tagged (selected)
by moving the bar with the arrow keys.
9.8.3 Range select <F4>
The range select function allows you to select a range of
messages matching a certain criteria. Most of the functions
only require a partial match with the selected search
criteria.
<F2>
From user Selects all messages from the specified user.
<F3>
To user Selects all messages to the specified user.
<F4>
Originating address
Selects all messages originating from the
specified address.
<F5>
Destination address
Selects all messages destined for the
specified address.
<F6>
Text Selects all messages containing the specified
search string in the message body.
<F7>
Date Selects all messages between two dates.
<F8>
Subject Selects all messages matching the specified
subject.
<F9>
Received Selects all messages with received (read)
status.
<Esc>
Exit Returns you to the main menu of the
management function.
72
9.9 Keyboard macros
The keyboard macros are located on <F1> - <F10> (12) and <Shift
F1> - <Shift-F10> (12). When a macro key is pressed, FM will
insert its contents at the current cursor position. The following
macros are supported:
Sequence Expands to Key in FM
---------------------------------------------------------------
~~ ~
~| |
| CR <Enter>
~B TAB <Tab>
~> Cursor one step to the right <Right>
~< Cursor one step to the left <Left>
~^ Cursor one line up <Up>
~V Cursor one line down <Down>
~F Reformat paragraph <Alt-F8>
~L Insert line <Ctrl-Enter>
~} Delete from cursor to EOL <Ctrl-End>
~T Delete from cursor to EOF <Ctrl-T>
~S Save message and keep original <Ctrl-Z>, 'N'
~# Save message and delete original <Ctrl-Z>, 'Y'
~U Current username
~! Invoke DOS shell <Alt-Z>
~E<prog><parm>; Execute program
~I<filename>; Import file <Alt-F2>
~R<filename>; Import file and remove it
9.9.1 Examples
The sequence "~Edir /w>x.bak;~Rx.bak;" (without the quotes)
will:
1. Execute "DIR /W>X.BAK"
2. Import X.BAK into the message text
3. Remove X.BAK
Note that the semi-colon (;) is NOT optional for the
"Execute" and "Import" macros. It determines the end of the
program name and its parameters and/or the end of the name of
the file to import.
73
The sequence "|~T|~B~B~BRegards,|~B~B~B~U|" (without the
quotes) will:
1. Insert a CR
2. Delete the text from the cursor to the end of the
message.
3. Insert another CR
4. Insert three TAB characters (equivalent to pressing
<Tab> three times).
5. Insert the text "Regards," without the quotes
followed by a CR.
6. Insert three TAB characters (equivalent to pressing
<Tab> three times).
7. Insert the current user's name followed by a CR.
Eg. ..
<message text>
..
Regards,
John Doe
74
9.10 Carbon copies (CC)
The Carbon Copy function, is more or less what the name implies.
A function that allows you to send the same message to two or
more recipients; a distribution list. The CC function is only
active in the NetMail folder. CCs can also be used for File
Attach and File Request messages.
To use the CC function, put the text "cc:" (case does not matter)
followed by one or more SysOp names or system addresses,
separated by a comma, at the top of the message. Once you select
to save the message, FM will scan the beginning of the message
text for CC: and if found, process each element of the CC list.
You can have more than one line with CCs. Eg.
cc: bremin,#bodger,samet
cc: howard,kasza,wallin,1:135/4
Note that if you create several messages using the CC function,
editing any of them will not reactivate the CC function. FM will
only process a CC list the first time you enter a message (ie. a
new message).
9.10.1 Hidden CCs
To hide a recipient in a CC list, put the pound (#) character
in front of the SysOp name or system address. Eg.
cc: #1:135/20,#1:135/990,2:310/11
9.10.2 Using files as input to CCs
You can also specify a file containing SysOp names or
addresses to the CC function. Eg.
cc: @betanote.txt
75
9.10.3 Address expansion
All addresses in a CC list can be entered in short form, and
several macros are recognized.
cc: MYNET
Will process your whole net and add every system to the CC
list. Note that the previously supported notation
"MYNET/node" (eg. MYNET/12) is no longer supported.
cc: 2:310/*, 1:135/*
Will include all systems in net 2:310 and 1:135.
cc: 2:270/17.*
Will include all listed point systems under 2:270/17.
76
9.11 Crossposting (XC)
Although CCs are not supported for EchoMail and Local folders,
there is an additional function that provides you with a method
of broadcasting the same message to two or more folders. This
function is called crossposting, XC hereafter, and is not
available in the noncommercial version.
To use the XC function, put the text "xc:" (case does not matter)
followed by one or more numbers, separated by commas. Each number
represents a folder number where you want the message
cross-posted. If your folder list looks like:
1 BNU
2 COMP.SYS.IBM.PC
3 FDECHO
4 TSECHO
5 NETSYSOP
And you put "xc: 1,3,5" in a message in folder two. The resulting
messages will have
* Crossposted in BNU
* Crossposted in COMP.SYS.IBM.PC
* Crossposted in FDECHO
* Crossposted in NETSYSOP
At the top of each message. The target folder is excluded from
the list. Ie. " * Crossposted in BNU " will appear in each
message not going to the first (BNU) folder.
77
10 Terminal
Although FrontDoor was designed primarily as an e-mail system, it
also features a powerful terminal emulator, hereafter called the
Terminal. The Terminal features very accurate and efficient Terminal
emulation and file transfer protocols; and several other features
found in expensive and/or complex communications packages.
The Terminal is invoked by pressing <Alt-J> from FD's main menu, or
by specifying /T on the command line when FD is started. You can also
choose to run FD in terminal-only mode, in which case the Terminal is
brought up directly when you start it.
Most functions of the Terminal are reached by holding down the <Alt>
key and pressing a key, <A..Z>. If you press a key that has no
function in the Terminal, it will display a message saying "Press
Alt-H for help".
10.1 Menus
Each function and menu of the Terminal will now be described.
10.1.1 File <Alt-F>
The file menu contains functions to manipulate macros, upload
and download files, transmit ASCII files, invoke DOS shell
and Editor, etc.
<Alt-G>
Download files Receive one or more files from the remote
system.
<Alt-T>
Upload files Transmit one or more files to the remote
system.
<Alt-A>
Transmit ASCII file
Allows you to transmit an ASCII file to the
remote. You will be able to select the
default inter-character delay and line
translation. It is possible to create simple
script or macro files by using this option.
<Alt-V>
Macro management
Allows you to create and maintain your macro
key sets. Use this function to make a
different macro key set the active set.
78
<Alt-E>
Profile management
Allows you to create, maintain, and select
IEMSI session profiles. IEMSI is discussed in
a separate section.
<Alt-U>
Command history
The Terminal records your last ten typed
lines. When you press Enter, it removes the
oldest entry and adds the newly typed line to
the list. You can choose any one of the ten
history entries and retransmit it to the
remote.
<Alt-I>
Editor Invokes the program defined in the Terminal >
Miscellaneous > Editor field in FDSETUP. You
will be asked for optional command line
parameters, they are stored for the remains
of your Terminal session. This could also be
used to bring up external protocol menus,
etc.
Note that the FOSSIL driver is deactivated
when leaving the Terminal and reactivated
upon returning to the Terminal. This is to
make sure FrontDoor maintain control of the
FOSSIL driver even when loading other
programs that could possibly leave the FOSSIL
driver in a non-desirable state.
<Alt-Z>
DOS shell Invokes a temporary DOS shell. Type EXIT and
press <Enter> to return to the Terminal.
<Alt-Q>
Quit Depending on how the Terminal was invoked,
this will return you to FD's main menu or to
DOS. If you are connected to a remote system
when you press <Alt-Q>, you will be asked to
confirm that you want to hang up.
10.1.2 Line settings <Alt-L>
The line settings menu contains your current communications
parameters. You cannot reach the options of this menu unless
you press <Alt-L>. Most of the options in this menu are self
explanatory, only the not so obvious options are explained
here.
79
BPS The current DTE baud rate. If you have
enabled the "Lock port" option, this field
will contain "Fixed" and you will not be able
to change it.
Wraparound Determines whether or not the Terminal should
place the cursor on a new line when it is
positioned at the rightmost position of the
screen and a character is received. This
should be set to On in most situations. There
are however VT100/VT52 applications that
require this setting to be Off. Note that a
CR/LF will force a new line even if this is
set to Off.
CR expansion Determines how a received CR character should
be processed. If set to CR, no expansion is
made. If, however, it is set to CR/LF, the
Terminal will expand all received CR
characters to CR/LF.
Local echo Some on-line services do not echo the
characters you type. It may be necessary to
enable this option to see what you are
typing. If the on-line service you are using
does echo the characters you type and you
enable this option, you will get duplicated
characters. Eg. "HHEELLLLOO!!".
Emulation Allows you to choose between ANSI, VT100,
VT52 and TTY (no) emulation. Note that the
default for ANSI emulation is to support
AVT/0+ (AVATAR/0+). This is a Terminal
emulation protocol designed by G. Adam
Stanislav. It is extremely fast and very
efficient.
Translation tables
If enabled, the Terminal will use the
Terminal translation tables to filter any
received characters.
Auto-Zmodem downloads
The Terminal monitors received characters for
the special sequence a Zmodem transmitter
sends when a Zmodem file session is started.
If it detects this start-up sequence, it will
automatically invoke the Zmodem receiver. If
you disable this option, you must use <Alt-G>
(Download) to receive files using the Zmodem
protocol.
80
Allow AVT/0 sequences
Determines whether or not you want to accept
AVT/0+ emulation sequences when you are in
ANSI emulation. Since AVT/0+ is based upon
certain control characters, you may want to
disable this option if you are using programs
like Doorway, etc. which frequently transmits
control characters.
Clear on Form Feeds
Determines whether or not the Terminal should
clear the screen when receiving a Form Feed
(FF, ASCII 12) character from the remote.
Interactive EMSI
Determines whether or not the Terminal should
attempt to establish IEMSI sessions with
systems you call. IEMSI is completely
transparent and should not cause any
problems. IEMSI is described in a separate
section.
10.1.3 Session <Alt-S>
<Alt-C>
Capture Allows you to capture characters, as they appear
on the screen, to a disk file, or logging it to a
printer. Since the Terminal filters out NUL
characters (ASCII 0), they will never appear in a
capture file.
Other characters and control sequences may not
appear either, depending on what terminal
emulation protocol is active at the time.
<Alt-N>
Conversation (chat)
The conversation mode function splits the screen
in half, creating two windows or sections on the
screen. Data received from the remote system will
be displayed in the top section, while the
characters you type will be displayed in the
bottom section.
<Alt-D>
Dial Allows you to dial a system in the nodelist. This
function is disabled if no nodelist files are
detected when the Terminal/FD is started. Note
that you cannot queue numbers in the nodelist.
<Alt-M>
Manual dial
Allows you to enter a number manually, which will
then be dialed until you press the <Esc> key or a
connection has been made. Note that you cannot
queue manually entered numbers.
81
<Alt-X>
Disconnect Disconnects the current call and displays the
elapsed time.
<Alt-P>
Phone directory
Brings up the phone directory manager.
<Alt-R>
Reset timer
Resets the on-line timer. The timer is
automatically reset when a new connection is
made.
<Alt-B>
Scroll back buffer
Allows you to view data that has scrolled off the
screen.
<Alt-W>
Send BREAK Sends a (short) BREAK signal to the modem.
Consult the documentation for your modem
regarding BREAK signals. This is often used to
terminate inquiries to commercial on-line
systems, etc. but can be treated differently by
your modem.
<Alt-J>
Clear screen
Clears the screen and moves the cursor to the
upper left-hand corner.
<Alt-Y>
Initialize modem
Transmits the Init-1..Init-3 modem strings as
configured in FDSETUP under Modem > Command
strings, followed by the Init string defined
under Terminal > Miscellaneous, to attempt to
initialize the modem.
This is not available in the noncommercial
version.
10.1.4 Options <Alt-O>
Most Terminal emulators and communications packages have a
status line, either at the top or at the bottom of the
screen; on which they display various information about
settings and the current connection. FrontDoor's Terminal
does not have a status line, hence the options menu.
82
10.2 Keyboard macros
Depending on how many function keys you have on your keyboard,
you will have access to 20 or 24 keyboard macros for every macro
set. You can have over 60,000 macro sets defined, but only one
can be active at any time. The macro management function is
reached by pressing <Alt-V>.
The keyboard macros are located on <Shift-F1> - <Shift-F10> (12)
and <Ctrl-F1> - <Ctrl-F10> (12). When a macro key is pressed, the
Terminal will send the data specified as the macro string,
uninterpreted, to the remote system. The two exceptions to this
are the tilde (~) character which forces a one second pause, and
the pipe (|) character which translates into a CR. Neither the
tilde, nor the pipe character is transmitted to the remote
system.
10.3 Raw mode
The IBM PC keyboard generates two characters for every key you
press. The first character is called the ASCII code, and the
second character is called the scan code. Only the ASCII code is
transmitted to the remote system by default. There are, however,
some situations which require the Terminal software to transmit
both codes. The AVATAR emulation protocol and the Doorway
programs both require the complete codes (two characters) to
identify certain keys; function and arrow keys in particular.
Once raw mode has been enabled (by pressing the Scroll Lock key),
you cannot reach any of the Terminal's regular functions. Raw
mode is disabled by deactivating Scroll Lock.
10.4 Keypad modes
The VT100 and VT52 emulation protocols require that the cursor
keys transmit different codes depending on the state of the
remote application. Most on-line services follows the VT100
recommendation for this, but several Editors and other programs
have their own ideas of how this should be handled.
If you enable the numerical keypad (Num Lock), the white cursor
keypad will transmit the numerical application codes for
VT100/VT52. If you have an extended (101/102) keyboard, the grey
cursor keys will not follow the numerical keypad setting.
By using the <Shift> key together with the white cursor keypad,
you can negate the setting of Num Lock temporarily. Ie. if Num
Lock is enabled and you press <Shift-Up> (8), the Terminal will
transmit the up key sequence to the remote. If Num Lock is
disabled and you press <Shift-Up> (8), the Terminal will transmit
the numerical application keypad sequence for 8.
83
10.5 PC keyboards
When the remote (host) requests that the Terminal enters
numerical application keypad mode, the Terminal automatically
enables Num Lock. On extended (101/102) keyboards, this will also
enable the Num Lock LED. The Num Lock LED on IBM-PC (standard)
keyboards will not change by doing this. The Options, <Alt-O>,
menu should correctly reflect the proper state of Num Lock
anyway.
10.6 Phone directory <Alt-P>
The phone directory allows you to define up to 200 (400 in the
commercial version) numbers in addition to those stored in the
nodelist database. The Terminal keeps the internal phone
directory in a file named TERMPHON.FD, which is located in the
SYSTEM directory.
The top menu in the phone directory has nine options.
<F1>
Clear queue Removes the queue (Q) status from all entries in
the phone directory. If no entries are listed in
the queue, no action is taken.
<F2>
<Enter>
Dial Adds the current (highlighted) number to the
queue and proceeds to the dial function. If no
connection is made, the Terminal will proceed to
the next number in the queue. If no other numbers
exists in the queue, the Terminal will wait the
defined (in FDSETUP) number of seconds before
trying again. You can abort dialing by pressing
<Esc>.
<F4>
Edit existing entry
Allows you to change an existing entry.
<F6>
Purge Removes all entries marked for deletion (small
square) from the phone directory. There is no way
to recover a removed entry, so use this option
with caution.
<F7>
<Space>
Toggle queue status
Adds/removes the current (highlighted) number to
the queue.
84
<F8>
Sort/Purge This option is similar to the PURGE option with
one difference. It will sort the phone directory
in ascending order, based on the name field.
<Ins>
Add entry Allows you to add a new entry to the phone
directory.
<Del>
Mark for deletion
Marks an entry for deletion (small square). No
other action is taken. You must use the <F6> or
<F8> function to remove entries marked for
deletion.
10.6.1 Queue status
The queue status is only retained while you are in the phone
directory. Once you return to the Terminal, the phone
directory is removed from memory.
10.6.2 Adding/changing entries
When you press <F4> (Edit) or <Ins> (Add), the edit screen
will appear. Press <F10> to save the entry and <Esc> to
abandon the entry/changes.
10.7 Inactivity timer
If you are not connected to another system, the Terminal function
will be terminated automatically after ten minutes of inactivity,
if there is no carrier signal. The timer is reset if a key is
pressed and when the carrier signal changes.
10.8 File transfers
When you transmit or receive files in the Terminal, it will
automatically set the line parameters to no parity, eight data
bits and one stop bit. Once the transfer is completed, the line
parameters will be reset to whatever values they had prior to the
transfer.
85
10.9 On-line timer
The on-line time displayed in the Options, <Alt-O>, menu shows
the elapsed time of the current connection in hours and minutes.
It is not intended as a precise mechanism for cost calculations,
etc. but will give you a rough estimate of the time you have
spent on-line.
86
11 Miscellaneous
This chapter contains functions and options that are global to all
programs in FrontDoor.
11.1 Destination of messages
When you are prompted for an address and/or SysOp name for a
message, you can use the look-up function. This is true for both
FD, FM, and the Terminal. FM only allows you to use the look-up
function for messages written in the NetMail folder.
You do not have to use the look-up function, of course. You can
enter a short form address, such as 10 (for node 10 in your own
net), .1 (for point one in your own point net) in which case the
SysOp's name is taken from the nodelist data. This is one of the
most flexible functions in FrontDoor.
11.1.1 Name lookups
If you specify "Homrig" as the destination, you will be
prompted to select from a list of all users with a last name
matching "Homrig" (Homrighausen for example). The network
address will also be taken from the name you select.
11.1.2 Address browsing
To enter the address browse mode, specify an incomplete
address, such as "2:?", "2:270/?" or "2:270/17.?". You can
then browse through all zones, regions, networks and
pointlists known to your system.
If you press <Enter> (and the input field is blank) when you
are prompted for an address, you will be placed in browse
mode in your own net.
87
11.1.3 Address macros (NAMES.FD)
You can also create a file containing short names which
expands into a full address/SysOp name. The macros are
located in a file called NAMES.FD which must be placed in the
SYSTEM directory. The format of NAMES.FD follows:
<alias>,<user name>,<address>[,<subject>]
ALIAS The name you want to use for the macro.
USER NAME The name you want FM to place in the TO: user
name field.
ADDRESS The network address you want as the destination
when using the macro.
SUBJECT The fourth and optional parameter can be used to
insert a default subject in FM and also in the
"File(s):" field in FD when using the "Mail
services" options "Request files" and "Transmit
files".
Eg. oci,James Smith,1:132/300
am,AreaMgr,2:512/1,MyAreaMgrPassword
joho,joaquim homrighausen,2:270/17
tebe,tomas bremin,2:270/7
tj,Tom Jennings,1:125/111
Would allow you to place "*oci", "*am", "*joho", "*tebe",
and "*tj" anywhere you are prompted for a network address
or user name, including carbon copies (CC).
A special format can also be used to automatically address
messages to UUCP and INTERNET gateways. By putting a
commercial at character (@) as the first character of the
user name field (second field), you indicate to FM that the
macro should receive special treatment.
Eg. dn,@INTERNET/david@csource.oz.au,2:241/999
Would place "INTERNET" in the message header's
TO: field and address the message to 2:241/999.
On the first line of the message text, it would
put "TO: david@csource.oz.au".
If no forward slash (/) is found in the user name
field (where "INTERNET" is above), FM defaults to
putting "UUCP" in the message header's TO: field.
This cannot be used for carbon copies (CC).
88
12 File Requests
This section will explain and discuss the various aspects of File
Requests. There are two types of Requests, File Request and Update
Request. The latter is basically a File Request that triggers a
mechanism to only send the requested files if they are more recent
than those found on the requesting system. Two basic terms have to be
explained and understood:
Outbound Requests A File or Update Request created and
transmitted by your system to another,
remote, system.
Inbound Requests A File or Update Request transmitted by
another system to your system.
There is no mechanism in FD to control how an outbound Request is
treated by the remote system. FD strictly deals with controlling the
access to and security of your system (inbound Requests).
12.1 Outbound Requests
When you want to Request one or more files from a remote system,
you may do so using several different methods:
1. By using FM and entering a message with File or Update
Request status. The files you want to request from the
remote system are listed on the subject (Re:) line of the
message and you set FilReq or UpdReq to indicate that FD
should give the message special treatment.
2. By using FD's temporary mail services, which are accessed
with <Alt-M> from FD's main menu. Whether or not the
Request is treated as an Update Request or File Request
is determined by how you specify the filename(s) in the
File(s): field. If you include a path, FD will treat it
as an Update Request, otherwise, it will be treated as a
File Request.
Requests created this way will not remain if FD is
brought down (for one reason or another) as they are
intended for temporary, quick and dirty, purposes only.
3. Use a robot utility, such as XRobot, to create the File
or Update Request message(s).
Note that an Update Request with no matching target, that is, you
have attempted to Update Request a file that does not exist on
your system, is automatically converted to a File Request.
89
12.2 Requesting files with a password
Since files and directories can be protected with passwords, it
may be necessary for you to present a password in order to
request certain files from a remote system.
To add a password to an outbound File or Update Request, you
simply put the password preceded by a space character and a '!'
character. Ie. <filename> !<password>. Regardless of whether you
are creating the Request in FM or from FD's Request function,
this is the format used to specify passwords.
12.3 Update Requests
As mentioned before, an Update Request is really a File Request.
The difference is that an Update Request is used to "update" a
file that already exists on your system. The mailers accomplish
this by transmitting the date and time of the existing file, the
system that processes (receives) the Update Request then compares
this with the requested filemask and sends any matching file that
has a later date and time.
12.4 Inbound Requests
You can control which directories should be accessible from the
"outside world" during a Request. This is accomplished by telling
FD which directories should be searched for matches. How FD
handles inbound Requests depends on how you have configured the
Mailer > File requests option screen in FDSETUP.
12.4.1 Request modes
There are three different modes which decide how FD treats a
Request from a remote system.
1. Anyone can request. This means that FD will allow any
system to Request files from your system, subject to
event behaviors and other modifiers.
2. Systems in nodelist can request. Similar to (1), but
FD will only process Requests received from systems
that are listed in your Nodelist database.
3. No requests. Forces FD to ignore any received
Requests, effectively disabling the ability to
request files from your system.
90
12.4.2 Directory listings
The directory list file is a plain vanilla ASCII file with
one directory (complete path) per line. This is used by FD to
determine which directories should be searched for a file
that is being requested by a remote system. No other
directories than those listed here will be searched.
Two separate list files can be defined in FDSETUP under
Mailer > File requests. The first one, LIST, is used for
unprotected sessions. The second one, SECLIST, is used for
password protected sessions; allowing you to make different
directories available for Request depending on the status of
the session. If no SECLIST file has been defined, FD will use
the LIST file for password protected sessions as well.
Please note that each line defines a directory and not a
filemask. All files in the specified directory will be
available for Request, subject to password protection and
other factors.
12.4.3 Alias listings
The alias list file is a plain vanilla ASCII file with one
alias definition per line. Alias definitions are useful to
allow remote systems to use the same name when requesting
files that change frequently, such as a file list or another
file with similar contents. The remote system simply requests
the "alias" and FD will send whatever files you have defined
to send for that alias.
Eg. FRODO C:\FILES\FDKIT.ARJ
XR C:\FILES\XROBOT.ARJ
RACCESS C:\FILES\RA*.ARJ
MYSECRET C:\TEST1.ARJ C:\TEST2.ARJ
The remote system can request FRODO, XR, RACCESS or MYSECRET
and get the above specified files. Files listed as alias
names do not have to be located in requestable (see
"Directory listings") directories.
Two separate alias files can be defined in FDSETUP under
Mailer > File requests. The first one, ALIAS, is used for
unprotected sessions. The second one, SECALIAS, is used for
password protected sessions; allowing you to make different
alias definitions available for Request depending on the
status of the session. If no SECALIAS file has been defined,
FD will use the ALIAS file for password protected sessions as
well.
91
12.4.4 Response message
In the event that FD cannot satisfy a Request for one reason
or another, it will return a message to the requesting system
telling it why the request(s) could not be satisfied.
If you have specified a filename for the MESSAGE option,
under Mailer > File requests, FD will attempt to open the
specified file and append its contents to the end of the
automatically generated response message.
12.4.5 Limiting Requests
You can choose to place a limit on how many files, how many
kilobytes, and/or how long a Request may take. This allows
you to fine tune your system for maximum efficiency.
Max match The maximum number of files your system will
send during one Request session. If the
remote system requests an alias filename that
expands to two files, the request is counted
as two files. A setting of zero disables this
feature.
Max size The maximum amount of data (in KB) your
system will send during one Request session.
Note that if the remote system requests an
alias filename that expands into two files,
the size of both files is checked. A setting
of zero disables this feature.
Max time The maximum time (in minutes) the resulting
files of a File or Update Request may take to
transfer. Before sending each file, a check
is made to see if sending the file will cause
this limit to be exceeded. If so, the file is
skipped and the next file in the list will be
checked. A setting of zero disables this
feature.
Minimum speed The minimum baud rate required to allow
Requests. If the current connection is at a
lower speed, Requests will not be honored.
92
12.4.6 Limited hours
You may also choose to limit the access of your Request
functions to certain days and certain hours of those days.
Limited Enables limited hours.
Start The time of day when your system should start
honoring Requests. This setting can only be
changed if the LIMITED option is enabled.
End The time of day when your system should stop
honoring Requests. This setting can only be
changed if the LIMITED option is enabled.
Days Defines on which days your system will honor
Requests.
12.4.7 Event restrictions
Ultimately, whether or not your system will honor Requests is
controlled by the current event's behavior. If the ALLOW FILE
REQUESTS option is set to NO, Requests will not be honored.
12.4.8 Protecting files and directories
You may want to protect access to certain files and
directories, just like another system may require you to
present the proper password to request one or more files. See
"Outbound Requests".
The Request Manager in FDSETUP is used to protect Inbound
Requests.
Filename/
Directory Defines the filename/directory you want to
protect. This is NOT an exclusive name. If you
set this field to C:\HIDDEN\ and define a
password, all Requests that result in files being
sent from C:\HIDDEN\ are protected. If you set
this field to MYSECRET.ARJ and define a password,
the file MYSECRET.ARJ will only be sent if the
requesting system presented the proper password.
Password Defines the password for the specified
file/directory. The requesting system have to
present this in its request to get the file(s).
These passwords are treated case insensitive.
Entries with inactive status in the Request Manager are
ignored by FD. Note that Alias definitions can also be
protected by placing the name of the Alias definition in the
Filename/Directory field.
93
13 Swapping
Both FM and FD requires over 220 KB of RAM. If you shell to DOS, or
load another program from FD, this memory is not freed. FrontDoor
allows you to swap out the memory used by FD and FM, either to
XMS/EMS memory or to a disk file. If you have specified that you want
the programs to use XMS/EMS memory for swapping but there is not
sufficient XMS/EMS memory available, the swap image is written to
disk. The swap file is placed in the SYSTEM directory and removed
when you return to the program.
If you enable swapping for FD, it will be swapped out when you invoke
a DOS shell and when you invoke other programs. The FD swap setting
also affects the Terminal. The Terminal will not flush its
scroll-back buffer to disk if any type of swapping is enabled for FD.
Once the swap image has been created and written to XMS/EMS memory or
a disk file, all used (by FD/FM) memory is freed except between three
and five KB which will always remain in memory.
13.1 Complete path specifications
To avoid problems when you enable swapping to XMS/EMS memory or
to a disk file, it is recommended that all the filename and
directory specifications under Global > Filenames in FDSETUP
contain complete path specifications, including a driver
specifier.
If you choose to swap to a disk file, it is further recommended
that you specify a complete path to where you want the swap files
to be placed (Global > FileNames > Swapping).
13.2 Loading programs in a DOS shell
Make sure that you do not load any TSR (Terminate and Stay
Resident) programs, such as DOS' PRINT and SideKick, when you are
in a DOS shell. Failure to follow this advice may lead to system
lockups when you attempt to return to FD or FM.
94
14 CRT environments
All programs in the FrontDoor package are screen environment aware
and most of them can adjust to most (if not all) screen sizes as long
as the current screen mode has 80 or more columns (horizontally).
If you have an EGA or VGA card that allows you to set the screen mode
to something like 132x28 and you want to use this in FM, FD, or the
Terminal, you should specify that you want the AUTO screen mode for
that particular program. This will prevent it from altering the
screen mode.
Please note that if you run FD in AUTO mode, you must run FM and the
Terminal in AUTO mode as well, if you plan to load either from FD
(and not just from DOS). Otherwise, FD will display garbage data on
the screen when you return from the Terminal. The opposite (running
the Terminal in AUTO and FD in 25 or 43/50) is, however, properly
handled.
To set extended screen modes (except 80x43 and 80x50), you must use
an external utility in the noncommercial version. The commercial
version allows you to specify video BIOS parameters to set and reset
extended screen modes.
95
15 Message Status Bits
Message status bits determines how FD will treat outbound (outgoing)
messages and how FM will treat locally destined messages. The Message
status menu is accessed by pressing <Alt-S> in FM and is also
displayed when entering a new message and changing the subject of a
message.
The keys listed refer to the status menu in FM.
<Ctrl-P>
Private Indicates that the message should only be read by the
addressee.
<Ctrl-C>
Crash High-priority mail. Messages with crash status can
never be routed or held by a route file (see Mail
routing). Crash messages do, however, NOT override
any cost restrictions for an event; they also require
that the destination system has been qualified before
FD will call it.
<Ctrl-H>
Hold The hold status will force FD to ignore the message
unless the destination system calls your system to
pick up its mail. If the message is destined for a
point system and the boss of the point system calls
your system, the message will be given to the boss
unless the message also has Direct status.
<Ctrl-F>
File Indicates that the message has one or more files
attached to it. The files are listed in the subject
(Re:) line. File attach messages can be routed and
held unless another status bit (Crash, Immediate,
Hold, etc.) prevents it. The default treatment of a
file attach message is to send it directly to its
destination.
<Ctrl-R>
File Request Indicates that the message is a File Request. The
requested files are listed in the subject line and
may contain wild-cards characters. File request
messages can be held, but are never routed. See "File
Requests".
<Ctrl-U>
Update request Similar to a File Request, <Ctrl-R>, but the subject
line (Re:) must contain valid (existing) file
specification(s). When FD connects to the destination
system, the requested files will only be sent by the
remote if they are more recent than the matching
files on your system. See "File Requests"
96
<Ctrl-K>
Kill/Sent Removes the message after it has been sent or picked
up. If the Kill/Sent status is not set on a message,
it will be marked as sent after it has been sent or
picked up.
<Ctrl-T>
Truncate file/sent
Truncates the attached files to zero length after
they have been sent or picked up. This option is only
valid for file attach messages.
Note that it is nearly impossible to recover a
truncated file so use this option with caution.
<Ctrl-E>
Delete file/sent
Removes the attached files after they have been sent
or picked up. This option is only valid for file
attach messages.
<Ctrl-D>
Direct Similar to the Crash status, with the difference that
they can be held. Messages with the Direct and Hold
status combined require that the destination system
(including points) call in to pickup their mail.
<Ctrl-I>
Immediate mail Similar to the Crash status, but messages with
immediate status will be sent at the first
opportunity, ignoring all restrictions and
qualifications. If there is one or more messages with
immediate status to a system, all other messages
(except those with hold status) to that system will
be added to the mail packet.
USE THIS OPTION WITH CAUTION!
<Ctrl-L>
Lock Locks a message from further access. This is done by
setting the DOS attribute to read-only and adding a
special flag to the message text. FD and most other
utilities will ignore message files (.MSG) with
read-only attribute.
Messages with lock status cannot be removed by any of
the purge functions and will never be sent (or picked
up). FM can, however, renumber a folder containing
one or more messages with locked status.
<Ctrl-S>
Sent Indicates that the message has been sent or picked up
by the addressee. Once a message has been flagged as
sent, they cannot be sent or picked up by the
addressee.
97
<Ctrl-Z>
No status Clears all status bits.
98
16 Mail routing
This is one of the most complex parts of FrontDoor and takes
considerable time to learn and understand. Make sure you understand
how each routing verb affects mail routing before you use it.
When FD is brought up, it scans for any active events and when one is
found, opens the route file, ROUTE.FD, and uses it to determine whom
to send mail to, and how to send it. The route file must be placed in
the SYSTEM directory. If the timestamp of the route file is modified,
FD will detect it and re-scan the NetMail folder (see "Semaphores").
Global routing verbs are those that appear before any SCHEDULE
keyword in the route file. They are always used, so you can specify
routing that is identical for all your events here.
Local routing verbs are those that appear between two schedule
keywords (a schedule block) in the route file. FD determines which
schedule block to use by searching for a schedule keyword with a tag
(letter) matching the current event tag (see "Events").
Several references are made to Hold status in this chapter. Do not
confuse this with the HOLD route verb. The Hold status refers to the
message status bit (see "Message Status Bits"), or where stated, to a
system's nodelist status.
FD allows you to insert comments in your route file. Every line with
a semicolon as the first non-space (TAB/Space) character is treated
as a comment. While comments may seem inadequate at first glance, it
is a very useful function. Going back to a route file you wrote five
months ago may not be your definition of spending a weekend in joy
and happiness.
Addresses specified in the route file should always be fully
expressed. The * macro (implying "ALL") is supported. You can also
use nodelist flags to specify a range of systems. The routing
language is completely case insensitive (case does not matter).
SCRIPT, SCripT, and scRIPt are all treated as the same command.
16.1 Default routing
FD has several default rules for routing that will be used if no
other rules have been defined for a specific system. Some of the
default rules cannot be overridden by routing verbs.
99
16.2 Message status
Messages with immediate (IMM hereafter), Crash, File/Update
Request, and Direct status will normally not be routed. They are
sent directly to the destination system, with the exception of
systems without a telephone number, as described later.
Messages with IMM or Crash status can never be held by using the
HOLD keyword. Messages with Crash status can, however, be
prevented from being sent by event behavior, qualification lists,
and cost restrictions, but never held with the HOLD route verb.
Messages with Hold status will NEVER be packed into a mail
packet. They can always be picked up by the destination system.
Messages to points with Hold status can and will be picked up if
the Boss of the point calls to pickup mail, unless the message
also has Direct status.
Messages with IMM status will always be packed into mail packets,
overriding ANY event restrictions. If you have a message with IMM
status, FD will add all other qualifying messages to the same
system to the same mail packet.
Messages with Received (read), Orphan, Lock, and/or Sent status
are ignored by FD.
16.3 Host/Hub/Boss routing
Messages not otherwise prevented from being routed will by
default be sent to the destination system's HOST (see "Nodelist")
if the destination system is outside your own net and to its HUB
if it is within your own net.
If you have mail for a system listed as DOWN in your nodelist
database, it will never be packed. If the system calls your
system to pick up mail, it will receive its mail.
If you have mail for a system listed as HOLD or PVT (no telephone
number) in your nodelist, the default behavior is to send the
mail via the system's Host, Hub, or Boss. If the mail to a HOLD
or PVT listed system contains file attaches, the mail packet will
by default be placed on hold for the Host/Hub, or go directly to
the Boss in the case of a point.
Messages to systems not in your nodelist (unlisted systems) will
not be Host/Hub routed by default, but they can be routed by
using route verbs.
Messages with Crash, IMM or Direct status, destined for points to
which FD cannot place a call directly will retain its status (and
restrictions), but FD will instead assume the point system's Boss
as the destination.
100
16.4 Qualifying systems
Before FD will send mail to a system, it must be qualified by
specifying its address, or a macro that includes its address in a
SCHEDULE block (this is not true for IMM mail as previously
described).
You can qualify a system by placing a SEND-TO statement in the
global section of a route file, but this is NOT RECOMMENDED.
SEND-TO, POLL and the optional SEND-LIST after a Schedule command
are the only available methods to qualify a system for mailing.
If FD cannot find ROUTE.FD, mail to all systems will be put on
hold for the destination system to call in and pickup its mail.
16.5 Route commands
SCHEDULE <TAG> [SEND-LIST]
Defines the start of a schedule block. All commands following a
Schedule command are considered a part of the same block until
another Schedule command is encountered.
TAG is a letter corresponding with the event tag, defined in
FDSETUP (see "Events"). You should only have one Schedule block
per defined event tag.
The optional SEND-LIST parameter should contain the systems to
qualify for the event.
SEND-TO <SEND-LIST>
Qualifies the specified systems. This is identical to the
optional SEND-LIST after the Schedule command.
HOLD <LIST>
Hold mail for the specified systems.
UNHOLD <LIST>
The opposite of HOLD. Useful if you have global HOLD statements
and want to negate the effect of those statements for one or more
systems.
101
NO-ROUTE <LIST>
Send mail to the specified systems directly. This overrides the
default routing rules. Some logics is applied to "directly" when
using the NO-ROUTE command. Systems which FD cannot mail directly
will be sent "as directly as possible".
If <LIST> includes a system listed as PVT (unpublished telephone
number), for example, FD evaluates the "NO-ROUTE" as "NO-ROUTE
this message to the system's nearest Host/Hub".
DIRECT <LIST>
Unconditionally send mail to the specified systems directly (you
can still place it on hold by using the HOLD command). No logics
is applied to this command, and if FD cannot call the specified
systems, the resulting mail packets are placed on hold
automatically. Note that a system must still exist for this to
apply. If a system that is included in a DIRECT <LIST> does not
exist, the message will be stamped "Orphan" and not included in a
mail packet, but it can still be picked up by the destination
system.
ROUTE-TO <TARGET> <LIST>
Route mail (excluding file attach messages) for the specified
systems through TARGET. This automatically implies "NO-ROUTE
<TARGET>", ie. the target system's mail will not be routed
through another system, even if so previously stated.
HOST-ROUTE <LIST>
Route messages, not otherwise prevented from being routed, for
the specified systems through their HOST system.
HUB-ROUTE <LIST>
Route messages, not otherwise prevented from being routed, for
the specified systems through their HUB system.
ROUTE-FILES <TARGET> <LIST>
Route file attach messages (excluding normal mail) for the
specified systems through TARGET. This automatically implies "NO-
ROUTE <TARGET>", ie. the target system's mail will not be routed
through another system, even if so previously stated.
You should ask the SysOp of the TARGET system if he allows you to
route files through his system before using this command.
102
POLL <LIST>
Force FD to call the specified systems even if there is no other
mail destined for them. This does not effect the routing of
existing mail destined for the specified systems. The POLL
command unconditionally qualifies a system for mailing. Each
system in LIST will only be called once. If an event is
restarted, FD will not call systems that it has already polled.
EXCEPT <LIST>
Specifies an exception to the LIST of the previously used
command.
FORWARD-FOR <LIST>
Tells FD that you allow the specified systems to send mail
(excluding file attach messages) through your system. Note that
this does not place any restrictions of the destination of the
forwarded mail.
FORWARD-TO <LIST>
Tells FD that you allow mail (excluding file attach messages) to
be forwarded through your system ONLY if it is destined to any of
the specified systems. This is a more secure alternative to the
FORWARD-FOR command.
FILES-FOR <LIST>
Identical to FORWARD-FOR, but for file attach messages.
FILES-TO <LIST>
Identical to FORWARD-TO, but for file attach messages.
DENY <LIST>
Allows you to prevent the specified systems from picking up
waiting mail. FD will still accept incoming mail from the
specified systems. This can be used to prevent local (or other
low-cost) systems from picking up their mail in national mail
events, etc.
103
SCRIPT <SCRIPT FILE> <LIST>
Tells FD to use the SCRIPT FILE when calling the specified
systems instead of the telephone number (if any) in your nodelist
database. Script files are explained in a separate section.
NO-SCRIPT <LIST>
Prevents FD from using default script handling for the specified
systems. Script files are explained in a separate section.
16.6 LIST specifications
You can use a variety of formats to specify a list of systems for
a route verb. A few follows:
* All systems
2:* All systems in zone two
2:270/* All systems in zone two, net 270.
2:270/1 2:270/1 and all points under it.
2:270/1.0 2:270/1 but no points under it.
2:270/1.1 2:270/1.1.
MYNET All systems in your own net. Note that the result
of this format depends on which AKA FD is
operating under. This is normally your primary
AKA.
16.7 Using nodelist flags
When you specify system LISTs to a route command, you can use
nodelist flags in place of address information. Most of the
available mail and system related nodelist flags are supported by
FD. You can mix flags and address information as you wish. A few
follows:
HST CM All systems with HST or CM in their nodelist
entry.
!HST All systems that do not have HST in their
nodelist entry. The ! character negates the
meaning of a flag.
!HST !CM All systems that do not have HST _or_ CM in
their nodelist entry.
104
!HST CSP All systems that do not have HST in their
nodelist entry and all systems that have CSP
in their nodelist entry.
1:1/101 HST CM 1:1/101 and all other systems with HST or CM
in their nodelist entry.
16.8 File routing/forwarding
FILES-FOR and FILES-TO will mark all in-transit (not destined for
your system) file attach messages as Del/Sent (see "Message
Status Bits"). If you receive the same file destined for two
different systems, the file will not be removed until it has been
sent to (or picked up by) both systems.
16.9 Message forwarding
When FD unpacks received mail packets, it will always mark
messages as in-transit if they are not destined for your system
(including any AKAs). These messages can be forwarded by using
FORWARD-FOR and FORWARD-TO, but FD will under NO circumstances
forward mail, that has not been entered or modified locally,
automatically to systems unless one or both of these two commands
are used.
16.10 Multiple zones
If you are operating under more than one AKA listed in different
zones, it is important to explicitly specify a zone for address
information in the route file.
16.11 Examples
Here are a few examples of route files and how to use route
commands:
schedule @ *
This is the most simple of route files and qualifies all systems
for mailing. It will force FD to use its default routing rules
for mail to all systems.
105
schedule @ *
route-to 2:512/1 2:*
hold 2:512/1 !CM !HST
This qualifies all systems for mailing, routes all mail destined
for zone two through 2:512/1, and places the mail for 2:512/1
(including the routed mail) and any systems, that do not have the
CM or HST flags in their nodelist entry, on hold.
schedule @ MYNET
This qualifies all systems in your own net and uses default
routing.
schedule @
send-to 1:* 2:* 3:*
route-to 2:512/1 2:*
except 2:201/329
2:201/130
route-to 3:632/348 3:*
deny MYNET
This qualifies all systems in zone one, two, and three. Routes
all mail destined for zone two through 2:512/1 except for mail
destined 2:201/329 and 2:201/130, routes all mail destined for
zone three through 3:632/348, and prevents systems in your own
net from picking up their mail.
schedule B *
hold *
except 2:*
no-route 2:*
This qualifies all systems, holds all mail except mail destined
for systems in zone two, and sends mail destined for zone two
directly to its destination.
hold *
schedule D MYNET
unhold MYNET
schedule A 1:*
unhold 1:*
This holds all mail by default (the HOLD command is in the global
section).
Schedule D sends mail to all systems in your own net.
Schedule A sends mail to all systems in zone one.
106
16.12 Dynamic packing
Whenever a mail event is started, FD scans the messages in the
netmail folder and possible packets are built. Messages that do
not qualify to be processed will not be packed (but kept in the
internal list). If a system calls in, FD will scan the message
list stored in memory and create a mail packet on the fly and
immediately send it to the calling system. So mail is always
available, 24 hours/day.
This means that your system does not have to be in an event for
other systems to pickup their mail. Note that you can prevent
systems from picking up their mail with the DENY command and by
modifying an event's behavior.
16.13 Regarding points
Points of other systems are always treated as their boss system
unless you explicitly specify the boss or a point. To ONLY
reference a boss system, without referencing its points, use .0
(eg. 2:270/17.0).
If you have the telephone number for another system's points, the
will be treated just like any other node. Ie. you can send mail
to them directly.
16.14 Order of evaluation
The route file is evaluated (processed) from top to bottom.
Because of this, it is wise to put the "global" (affecting all
systems) first, followed by the exceptions. Eg.
route-to 2:512/1 *
no-route 2:270/17
will result in all mail being routed via 2:512/1, except mail for
2:270/17, which is sent directly to 2:270/17.
The only route command that cannot be overridden in this manner
is the ROUTE-FILES command. It is therefore required that you use
the EXCEPT keyword to override a ROUTE-FILES command where
necessary. Eg.
route-files 2:512/1 *
except 2:270/17
will result in all file attaches messages being sent via 2:512/1,
except file attach messages destined for 2:207/17, which are sent
directly to 2:270/17. The only other way to override the effects
of a ROUTE-FILES command is to use the DIRECT command.
107
16.15 TARGET vs. qualification
Note that only actual <TARGET> systems, and systems which you
have told FD to send mail directly to, or systems not otherwise
included in default routing, need to be qualified.
route-to 2:512/1 *
no-route 2:270/17
schedule @ 2:512/1 2:270/17
Note that even if you have mail for a non-qualified system (ie. a
system other than 2:512/1 and 2:270/17), it would be routed to
2:512/1, and qualified for sending (via 2:512/1), using the above
scenario.
16.16 Restrictions
A <TARGET> system cannot contain a point address.
You can not route mail destined for your own systems via another
system.
16.17 Macros
MYZONE All systems in your zone.
MYNET All systems in your net.
MYPOINTS All points under your system.
16.18 Supported nodelist flags
Note that the meaning of the following flags can be negated by
placing a '!' character in front of them, eg. !HST.
CM, MO, HST, H96, PEP, MAX, XA, XB, XC, XP, XW, XX, MNP, V29,
V32, V33, V34, V42, V42B, V32B, CSP.
All FrontDoor systems should have the "XA" flag in their nodelist
entry.
108
17 EMSI and IEMSI
EMSI (EMSC-001 and FSC-0056) or "Electronic Mail Standard
Identification" is a handshake method developed by Joaquim H.
Homrighausen and Chris Irwin (author of D'Bridge). It provides
features and flexibility that other handshake methods, such as FTS-1
and FTS-6 (YooHoo), do not offer.
The two major advantages of the EMSI handshake method is the ability
to pickup mail for all your AKAs in one call, and unlimited expansion
of the data (handshake packets) exchanged when a session is
negotiated. I will not go into any technical details about EMSI here,
I will, however, describe the handling of the multiple AKAs.
The EMSI handshake is supported by FrontDoor, AirMail, TrapDoor, and
D'Bridge. I expect other packages such as BinkleyTerm to add support
for it in the near future. EMSI does not interfere with other
handshake protocols such as FTS-1 and FTS-6.
17.1 Passwords
If you have established or wish to establish a session level
password for a certain system, you must make sure that you have
entered all AKAs of that system in the Security Manager. All
entries must have the same password.
For example, let us assume you want to establish a session level
password with 1:135/142 which is also 26:1305/142. You should add
both 1:135/142 and 26:1305/142 in the security manager and use
the same password for both entries.
17.2 Mail
Using the same example, if you have mail for both 1:135/142 and
26:1305/142, all mail (for both addresses) would be delivered
during the same session. This is true for both inbound and
outbound connections.
If you know that a system is EMSI capable and you have regular
mail traffic with more than one of its AKAs, you can HOLD mail
for the system's other AKAs and only allow the Mailer (FD) to
call one of the addresses. When the session is established, all
of the remote system's AKAs are processed.
This probably sounds more confusing than it really is. So to make
a long story short, make sure you have the "Present all AKAs to
remote" option enabled (Mailer>Miscellaneous) and play it by ear.
109
17.3 IEMSI
IEMSI is similar to the EMSI handshake protocol, with the
exception that it deals with the handshake between a terminal
program (such as the one found in FrontDoor) and an on-line
service, such as a BBS.
110
18 Script language
The script language provides an alternative method of calling a
system (instead of calling it directly with the telephone number
listed in your nodelist). A script file is used where you have to, or
prefer to, connect to another system indirectly. Ie. you will not be
calling it by dialing its number directly. This could be through X.25
or PC Pursuit.
The script file must be a plain vanilla ASCII file. A semicolon (;)
may be used as a comment character, making FD ignore everything
following the semicolon on the same line. FD is not case sensitive
when interpreting the script file.
The route file (ROUTE.FD) can be used to specify that a script should
be used for one or more nodes by entering:
SCRIPT <SCRIPT FILE> <LIST>
(see Mail routing). The command may be global or local to a specific
event's schedule block. If you are using PC Pursuit, you can use a
generic script file for all "PC Pursuitable" nodes. See PCP SCRIPTS.
18.1 What can I do with it?
The script language consists of a number of commands that allows
you to send characters to the modem, wait for responses from the
modem or the remote system/network that you are using, and
trigger different actions depending on the responses you get.
The versatility of the script language is further enhanced by the
use of so-called labels to execute different parts of the script
depending on a specific situation. The script language can be
seen as a simple programming language for controlling the way FD
or the Terminal makes a call.
18.2 Commands
SEND <STRING>
Sends a series of characters to the modem or the remote system.
Everything following the SEND command on the same line will be
sent. Control characters may be entered using mnemonics, eg.
<CR>. In addition, <CR> (carriage return) may be sent by using
the pipe (|) symbol. The string will be sent exactly as entered,
with no case conversion.
111
DIAL <NUMBER>
Sends NUMBER, preceded by the dial command specified in FDSETUP's
modem section. Control characters may be entered in the same
manner as with the SEND command.
SETPORT <BAUD> <DATABITS> <STOPBITS> <PARITY>
Sets the communications port to the specified parameters. BAUD
can be any value supported by the hardware between 300 and 9600
baud. At no time will the baud rate be set to a higher value than
the highest supported speed of the destination system, or the
baud rate of the outbound node in a PC Pursuit script. DATABITS
is 7 or 8. STOPBITS is 1 or 2. PARITY is NONE, ODD or EVEN. In
addition, a value of -1 means that the previous setting for that
parameter should be retained.
PROVOKE <STRING>
Keeps sending STRING with an interval of one second, until any
character is received from the remote system, or until a timeout
occurs (see TIMERSET), or until interrupted by the user. Control
characters may be entered in the same manner as with the SEND
command.
TIMERSET <SECONDS>
Sets the timer for fatal timeouts while waiting to receive
something from the remote system. The default is 120 seconds (two
minutes). The maximum value is 300 seconds (five minutes), and
the minimum is 0.
DEBUG <ON|OFF>
Sets debug mode on or off. In debug mode, all characters received
while waiting for one or more strings will be displayed. When you
are not using debug mode, only the string that matched a pattern
will be displayed. Similarly, in debug mode all strings sent to
the modem/remote system will be displayed, whereas FD will only
say "Sending string" when not using debug mode. It is recommended
that you enable debug mode while developing and testing a script.
WAIT <SECONDS>
Makes the script wait for SECONDS seconds before continuing.
112
WAITFOR <STRING>[|<STRING>|<STRING>..]
Forces the script function to wait for one or more specified stri
ngs or until a timeout occurs (see TIMERSET). Each string must be
separated with a pipe (|) character. Control characters may be
entered in the same manner as with the SEND command. Of the
specified strings, only the first will signify success, the other
strings will immediately terminate the script with failed status.
The string comparison is case sensitive, and requires an exact
match.
CASE / ENDCASE
Starts and ends a CASE statement, respectively. CASE is a more
flexible variety of WAITFOR. Each line after CASE must start with
a string that the script should wait for, followed by a colon and
one or more script commands, or a label jump directive (see
LABELS).
If the string consists of more than one word, it must specified
between quote characters ("). The CASE statement is ended with
the command ENDCASE on a separate line.
When a matching string has been received from the modem or the
remote system, the command on the same line will be executed. If
the command consists of a label jump instruction, the script will
continue from the specified label position. If it is one or more
script commands, they will be executed, and the script will
continue from the line following the ENDCASE statement, unless
the command terminates the script (see SESSION and FAIL).
The string comparison is case sensitive, and requires an exact
match. A short example follows.
CASE ; Comments:
CONNECT : session ; connect
BUSY : >redial
"NO CARRIER": >redial
VOICE : fail
@NOCARRIER : fail ; carrier lost
@DEFAULT : fail ; timeout
ENDCASE
113
@NOCARRIER Tests the presence of carrier in a CASE
statement.
@DEFAULT May be used to specify a default course of action
if a timeout occurs in a CASE statement.
SESSION
Terminates the script with success status, leading to a mail
session. It is NOT necessary to have a SESSION command in script
files used to connect to another system in the Terminal. The
SESSION command is only used to establish mail sessions.
FAIL
Terminates the script with failed status. No mail session will be
initiated.
PURGEIN
Purges the inbound buffer, getting rid of any pending characters.
PURGEOUT
Purges the outbound buffer, getting rid of any pending
characters.
RETRYCOUNT <RETRIES>
Provides a means of incrementing and checking a predefined retry
count variable. If the retry count exceeds RETRIES, the script is
terminated with failed status, otherwise the count is incremented
with 1. The retry count does not include the first attempt.
CLEARCOUNT
Clears the predefined retry count variable, resetting it to 0.
114
MAX2400 <COMMANDS>
MAX1200 <COMMANDS>
Commands following on the same line will only be executed if the
max baudrate for the session is 1200/2400. The maximum baudrate
for a session is calculated as the maximum baudrate supported by
the remote system, by the outbound node (if using PCP), or by
your own modem, whichever is lowest.
Eg. MAX2400 setport 2400 -1 -1 -1
MAX1200 setport 1200 -1 -1 -1
@OUTBOUND
Used to insert the name of an outbound PC Pursuit node in a
string. The contents of @OUTBOUND is undefined if used in any
other script than PCP.SCR.
Eg. send C @OUTBOUND,ABC12345<CR>
@LOCALNUM
Used to insert the local telephone number in a PC Pursuit script.
The contents of @LOCALNUM is undefined if used in any other
script than PCP.SCR.
Eg. send ATDT@LOCALNUM<CR>
ENDNODE
Terminates a "node block". See NODE BLOCK.
UPLOAD <PROTOCOL> <FILESPEC>
Transmits the files matching FILESPEC to the remote, using the
PROTOCOL transfer protocol (X=Xmodem, T=Telink, S=SEAlink,
Z=Zmodem). FILESPEC may include wild-cards characters for all
protocols. This command is not available in the noncommercial
version.
Eg. upload Z C:\FILES\FD*.LZH
115
DOWNLOAD <PROTOCOL> <PATH>
Receives one or more files from the remote, using the PROTOCOL
transfer protocol (X=Xmodem, T=Telink, S=SEAlink, Z=Zmodem). PATH
must be a complete filename for Xmodem transfers and a valid
directory for Zmodem, SEAlink, and Telink transfers. This command
is not available in the noncommercial version.
Eg. download Z C:\INFILES\
download X C:\INFILES\FUN.LZH
DISCONNECT
Unconditionally terminates a call (if any) from within a script.
Script execution will resume as soon as the carrier (CD) signal
has been lost; the script function lowers DTR to disconnect. This
command is not available in the noncommercial version.
IFBAD
<line to execute>
Executes the command(s) listed on <line to execute> (which is the
line following "IFBAD") if an UPLOAD or DOWNLOAD command failed.
This command is not available in the noncommercial version.
SENDBREAK
Transmits a short BREAK signal to the modem. This command is not
available in the noncommercial version.
LONGBREAK
Transmits a long BREAK signal to the modem. This command is not
available in the noncommercial version.
116
18.3 Labels
A label is used to define a position in the script, so that it
may be used as a jump destination. The label can consist of any
word, starting with a letter from A to Z, except the above script
commands, and must be preceded by a colon.
At the position in the script where you want to execute a jump to
the label, you enter the label name preceded by a greater than
sign (>).
Eg. ..
..
:redial
send ATDT@LOCALNUM<CR>
CASE
CONNECT : session
BUSY : >redial
@default : fail
ENDCASE
18.4 Node block
A node block is a special type of label. It starts with a node
number preceded by a colon. All commands from the first line to
the ENDNODE statement, that ends the node block, will only be
executed if you are currently calling the specified node.
Eg. ..
..
:270/17 ; start of node block
send ATZ<CR>
ENDNODE ; end of node block
18.5 PC Pursuit
You can use a generic script for calling all "PC Pursuitable"
nodes, taking advantage of the specific PCP commands @OUTBOUND
and @LOCALNUM. This requires that the script file is named
PCP.SCR and is placed in the SYSTEM directory. You must also
compile the nodelist with the file PCP.DAT, containing a list of
all "PC Pursuitable" exchanges, present in the NODELIST
directory.
If you have followed these steps, the PCP script file will be
used automatically when FrontDoor finds that a node is "PC
Pursuitable". You will probably wish to prevent FrontDoor from
using the PCP script in the daytime on weekdays. A special route
command, NO-SCRIPT, exists specifically for this purpose. For
further information, see Mail routing.
117
18.6 How do I update PCP.DAT?
The file PCP.DAT is a somewhat modified version of the file
provided by Telenet's BBS. We take no responsibilities whatsoever
regarding the contents of the PCP.DAT file supplied with
FrontDoor. To update it, you must issue CONNECT PURSUIT from
PCP's command prompt and log-on to their BBS. The file that you
want to download is called EXCHANGE.TXT (or EXCHANGE.ARC). Should
you update this file, you MUST make sure that your files follows
the same format as the file supplied with FrontDoor.
18.7 MNEMONICS
The following mnemonics may be used to enter control characters
in the script, both for sending and receiving. They can be used
with the following commands: SEND, DIAL, PROVOKE, WAITFOR, and
CASE.
ASCII MNEMONIC : ASCII MNEMONIC
--------------------+----------------------
0 <NUL> : 17 <DC1>
1 <SOH> : 18 <DC2>
2 <STX> : 19 <DC3>
3 <ETX> : 20 <DC4>
4 <EOT> : 21 <NAK>
5 <ENQ> : 22 <SYN>
6 <ACK> : 23 <ETB>
7 <BEL> : 24 <CAN>
8 <BS> : 25 <EM>
9 <HT> : 26 <SUB>
10 <LF> : 27 <ESC>
11 <VT> : 28 <FS>
12 <FF> : 29 <GS>
13 <CR> : 30 <RS>
14 <SO> : 31 <US>
15 <SI> : 32 <SP>
16 <DLE> :
--------------------+----------------------
118
19 FDSERVER
FD has a function referred to as FDSERVER. It can be used to perform
functions on your system from a remote site, such as moving and
copying files, etc. FDSERVER is a very powerful function and the
examples given in this chapter are only some of the things you can do
with it.
FDSERVER is activated by specifying a password in FDSETUP. FDSERVER
requests will be ignored if no password has been specified in
FDSETUP.
FDSERVER requests are processed after a mail session has been
completed and the call has been terminated, so everything you specify
in request message is processed off-line.
19.1 What is a FDSERVER request?
A FDSERVER request is a message, addressed to FDSERVER (case does
not matter) on your system, with commands. Think of it as a
remote, but controlled, DOS shell. You can run almost any program
and perform any DOS function from a FDSERVER request. The
FDSERVER function has some limitations, however.
You cannot use the DOS command ECHO in a FDSERVER request.
Programs that require local keyboard input should not be executed
from a FDSERVER request since these program(s) will just sit and
wait for keyboard input.
FDSERVER request messages must NOT be compressed (ARCmail, etc.).
The function is only triggered if FD unpacks the request message.
Batch (.BAT) file labels are not supported.
19.2 Request message
Each line of the message is considered a command and blank lines
are ignored. When FDSERVER has executed all commands found in the
message, it will change drive and directory to where it was
before processing your request and return to FD.
119
19.2.1 Internal commands
Lines beginning with a % character are internal FDSERVER
commands.
%logall Will create one line in the log file for each
command that was executed along with the
status (err: or exe:).
%nologerr Normally, all commands that generated an
errorlevel will be logged, this can be
disabled with this command.
%store After a request is processed, it will be
deleted by default. This can be disabled by
putting this command in the message which
will force FDSERVER to mark the messages as
received.
19.3 Using it
You are sitting in front of your computer at home, working with a
report or something similar and find that you need some files
from the office machine.
Assuming that these files contain information that is very
sensitive or confidential, and even though you have the option to
protect your file requests with a password, you may still not
want to have the files semi-accessible. This is where you can use
FDSERVER.
The directories and file names used in this example were thought
up and does not necessarily match the setup on your machine.
Create a message addressed to FDSERVER on the node you want to
call and send it.
By: joaquim homrighausen, JoHo's Home (2:270/17.1)
To: fdserver, Advanced Engineering sarl (2:270/17)
Re: password
----------------------------------------------------
%nologerr
cd \TEMP
copy C:\LOTUS\THA*.SPS
arj a THA THA*.SPS
erase *.SPS
copy THA.ARJ C:\REQUEST\FORNOW
erase THA.ARJ
120
The server function will read the message and execute each line.
The next step would be to create a new server request containing
the following:
By: joaquim homrighausen, JoHo's Home (2:270/17.1)
To: fdserver, Advanced Engineering sarl (2:270/17)
Re: password
----------------------------------------------------
%nologerr
erase C:\REQUEST\FORNOW\THA.ARJ
And send it along with a File Request for THA.ARJ. FD will
process the File Request first, and when the mail session has
been completed, the newly created server request will be
processed by FDSERVER.
19.4 Keeping calls to a minimum
You could avoid the extra phone call in the example with the
request if you have a robot utility such as XRobot (by Joaquim H.
Homrighausen) and create a file attach with the files you need so
the Mailer will call you back.
19.5 Security
If you do not need to use FDSERVER, Do not define a password for
it in FDSETUP. Since FDSERVER is a VERY powerful function, the
results could be disastrous if someone got hold of your FDSERVER
password.
121
20 Service requests
Service requests is a very powerful function of FD. It allows you to
use FD as a front-end to databases, to make on-line inquiries etc.
without having to manually call the system with a Terminal program.
20.1 Service requests vs FDSERVER
The difference between a service request and a FDSERVER request
is that they are processed while two systems are connected. This
has the drawback of being slightly more expensive, but it offers
a much greater flexibility than the FDSERVER function.
Consider this. You have a program on your system that allows
people to search for data in a database of files and then get a
list of all the new files, you have named the service request
WHATSNEW.
Your system receives a file request for WHATSNEW and FD runs the
program SEARCH.EXE, defined as the program to run for WHATSNEW.
When SEARCH terminates, FD will send the file NEWFILES.LST,
created by SEARCH, to the remote system.
20.2 Setting up
Service requests are defined in the ALIAS file (where you define
alias file names for file requests). The format of a service
request definition looks like this:
<NAME> ><PROGRAM> <PARAMETERS> ^<+ or - path name>
Eg.
WHATSNEW >SEARCH.EXE findit =A =T ^-C:\SERVICE\RESULT\*.TXT
Service name
NAME (case does not matter) is what the remote system should
request to invoke the service request.
Program
>PROGRAM is the program that should be invoked when FD receives a
request for NAME. The > character is required and tells FD it is
a service request and not an alias definition. There should be no
spaces between the > and PROGRAM.
The extension of PROGRAM is important. FD can execute batch
(.BAT) files as a result of a service request, but it must do it
through COMMAND.COM. So it has to know what type of file
(program) it is that you are executing.
122
Parameters
You can pass any parameters to the program. The only restriction
is (as with DOS) that they do not exceed a length of 128
characters and none of them starts with the ^ (see below)
character.
There are several macros that you can specify as parameters.
Macros should be preceded by a single equal sign (=). FD will
expand these macros before calling the program. You may include
macros in other parameters.
Eg. -p=P Would pass -p followed by the value of the P
macro to the program.
Macros
Here is a list of the available macros:
=A The requesting system's network address. Eg.
2:270/17.
=B The baud rate of the connection. Eg. 9600.
=C The cost per minute for the connection. If your
system initiated the session (called the
requesting system), this is the cost per minute.
If the requesting system initiated the session
(called your system), this will be 0.
=D OUTBOUND if your system initiated the session
(called the requesting system) or INBOUND if the
requesting system initiated the session (called
your system).
=L The requesting system's location. Eg. Oetrange_L.
This value is taken from the nodelist based on
the network address. Note that if the requesting
system is not listed in your nodelist, this value
will be "UNKNOWN".
=N The name of the requesting system. Eg. FroDo_HQ.
=O The operator of the requesting system. Eg.
Bilbo_Baggins. Note that space characters are
replaced with an underscore.
=P The password that was specified for the request
(if any).
123
=S The service that was requested. Eg. WHATSNEW.
=U The date and time supplied on an update request.
It is expressed in UNIX format, ie. the number of
seconds since 1970. If the request was a plain
file request, this will be 0.
=X Whether or not the session is password protected.
This macro can have two values, SECURE or
UNSECURE.
=Z The type of the mail session that has been
established. This macro can have three values,
WAZOO, EMSI, or OTHER.
20.3 ^ - + ?
The ^ character defines the beginning of a filemask that FD
should send after the service request has been completed. If no ^
definition has been made, FD will not send any files as the
result of a service request.
The plus (+) means that FD should NOT remove the files once they
have been transmitted.
The minus (-) means that FD SHOULD remove the files once they
have been transmitted. This also means that the files will be
removed even if they could not be sent (carrier lost, etc).
The question mark (?) means that FD should ONLY remove the files
once they have been SUCCESSFULLY transmitted. This means that if
a session fails after transmitting three files, only those three
files will be removed and the remaining left intact.
The path name is a file specification, it may include wildcard (?
and *) characters. FD will send all matching files.
20.4 Remote system information
When FD loads the program specified for the request, it will
create a file with information about the remote (requesting)
system, such as the system name, system location, operator's
name, list of network addresses, etc. allowing an external
program to access this information without having to know the
internals of FrontDoor. This file is described in detail in the
FrontDoor Developer's Kit (FDDEV).
124
20.5 Security
Since service requests are built on the concept of File Requests,
they are protected the same way a File Requests is protected. To
setup a password, you have to use the Request Manager in FDSETUP
and define a password for the service request name.
20.6 A word of wisdom
Service Requests should be used with extreme caution. It is
recommended that you have a full understanding of what a service
request actually does before you attempt to use it.
You should also keep in mind that the requesting system is
waiting at the other end for FD to start sending files. So keep
it short and sweet.
125
21 Global command line switches
Support for these switches is included in all programs in FrontDoor,
except where otherwise stated. All command line parameters must be
preceded by either a forward slash (/) or a dash (-). Command line
parameters are case insensitive (case does not matter) except where
otherwise stated.
Switch Programs Description
--------------------------------------------------------------------
C FDSETUP Forces color mode
M FDSETUP Forces monochrome mode
NORES All Disables use of internal (and undocumented)
DOS pathname resolution calls. This is
required under PC-MOS/386 and some LAN
environments.
NOCOMMIT All Disables use of DOS 3.3 commit() call.
NOSHADOW All Disables window shadows.
NOMULD All Prevents FrontDoor from attempting to detect
a multi-tasking environment, such as DESQview
and PC-MOS/386.
NOEKBD All Prevents FrontDoor from using extended (AT-
style) keyboard BIOS calls.
NOISCR FM Forces FM to treat a SoftCR (ASCII 141)
character as any other printable character.
The default for FM is to strip these when
reading and writing message from/to disk.
INTL FM Forces FM to always insert the ^aINTL kludge
line in newly created NetMail messages. FM
will, by default, only insert INTL
information if the destination system of the
message is located in a different zone than
that of the originating address (your) used
to create the message, or when a different
originating address than your primary AKA is
used.
NOEMS FD, FM Disables use of LIM/EMS memory for overlay
file buffers. This switch does not affect
whether or not FD and FM use EMS/XMS memory
when (if) swapping.
NOLOCK FM Disables Hudson Message Base locking support
in FM. Do not use this unless absolutely
necessary.
126
Switch Programs Description
--------------------------------------------------------------------
NODASH FD Forces FD to strip dash (-) characters from
telephone numbers before sending them to the
modem. This does not affect how telephone
numbers are displayed on screen or logged to
disk.
NOUNPACK FD Forces FD to ignore received mail packets
(files with .PKT extension). This assumes
that you have an external utility to unpack
NetMail packets. Do not use this unless you
absolutely need it.
NOMDM FD Forces FD to ignore information listed in
MODEM.FD.
NOSLO FD Disables support for the Overdrive protocol
option (SLO) in SEAlink. SLO is by default
only active during error free connections
(/ARQ, /MNP, /LAPM, etc.) and for link speeds
above 2400 BPS.
NODZA FD Disables support for the DirectZAP Zmodem
protocol (DZA) variant used between some EMSI
capable mailers such as FrontDoor and
D'Bridge. DZA is only used during EMSI mail
sessions that have not been negotiated via a
script file.
NOZAP FD Disables support for the Zmodem protocol
during mail sessions negotiated using the
FTS-6 (YooHoo) session protocol. This
effectively means that FD will only establish
FTS-6 sessions using the DietIFNA protocol
option. This does not affect sessions
negotiated using EMSI.
NOYOOHOO FD Disables support for the FTS-6 (YooHoo)
session protocol. This means that FD will
only support FTS-1 and EMSI sessions, unless
otherwise restricted.
NOFTSC1 FD Disables support for the FTS-1 session
protocol, effectively making FD non-FidoNet
compliant. This means that FD will only
support FTS-6 and EMSI sessions, unless
otherwise restricted.
--- Public (listed as non-PVT in the FidoNet
nodelist) FidoNet systems should use this
option with CAUTION since by using it, you
may be in violation FidoNet policy. ---
127
Switch Programs Description
--------------------------------------------------------------------
NOEMSI FD Disables support for the FSC-0056 (EMSI)
session protocol. This means that FD will
only support FTS-1 and FTS-6 sessions, unless
otherwise restricted.
RDEBUG FD Enables debug output from the mail routing
handler in FD. This is quite useful when
debugging your ROUTE.FD file.
X<1..255> FD Forces FD to terminate with the specified
errorlevel as soon as there is no more
outbound calls to make. This is not available
in the noncommercial version.
T FD Forces FD into Terminal mode directly from
DOS. Once you exit the Terminal, you will be
returned to DOS.
M FD Forces FD into Mail mode directly from DOS.
This switch was added to allow you to
override the Terminal-only setting in
FDSETUP.
S FD Forces FD to ignore any forced events it may
have missed. FD will by default execute all
pending external events when it is brought
up. This switch is useful if you have
performed system maintenance for several
hours and do not want FD to execute any
overdue forced events.
L:<pwd> FD Locks the keyboard with the specified
password directly from DOS. This has the same
effect as using the LOCK, <Alt-L>, function
from FD's main menu.
ONLINE Terminal Forces the Terminal to not initialize the
modem when it is started. This is not
available in the noncommercial version.
21.1 A word of wisdom
Please be aware that some of the previously described command
line switches completely alter the way FrontDoor acts and may
make it incompatible with other software and/or some
environments.
Use the switches with caution and when in doubt, try to test the
effects of the switch in a local environment or between your own
and a friend's system before you leave FD to answer your
telephone unattended.
128
22 Environment variables
Several environment variables affect how FrontDoor operates. It is
assumed that you are familiar with what and environment variable is
and how to set/remove one.
22.1 FDOPT
All of the "Global command line switches" except "-/C" and "-/M"
can also be specified by including them in the FDOPT environment
variable. To include more than one option, separate them by a
comma, eg.
SET FDOPT=NOISCR,NOSHADOW
22.2 FDSWAP
Overrides the "Swapping" path, defined under Global > Filenames
in FDSETUP, eg.
SET FDSWAP=D:\TEMPDIR\
22.3 POINTNET
See "Nodelist and the Nodelist Compiler".
22.4 FMOVR and FDOVR
Allows you to specify a complete path where FM and FD should look
for their overlay (.OVR) files. Useful when multiple copies of
either program are being used (eg. multi-line environment). This
is not available in the noncommercial version.
129
23 Semaphore files
FrontDoor can be controlled by using so called semaphore files. Both
FD and FM periodically scan for certain file names in the SYSTEM
directory, and if found, performs a task such as rescanning the
contents of the NetMail folder, exits to DOS, prevents human callers,
and more.
The commercial version furthermore allows you to specify a separate
semaphore directory (see FDSETUP > Global > Filenames) to allow
several copies of FM and FD to use the same semaphore files.
FD uses the lower right hand corner of its main screen to indicate
that one or more semaphore is present.
Filename Programs Description
--------------------------------------------------------------------
FDRESCAN.NOW FD Forces FD to discard all mail packets
(NOT messages) from the packet directory
and rescan the contents of the NetMail
folder before rebuilding the packets.
FMRESCAN.NOW FM Forces FM to rebuild its internal list of
messages in the NetMail folder.
FDINSESS.nnn FD, FM FD creates this file whenever a mail
session is initiated, and when it is
dialing a system, attempting to establish
a mail session. If FM detects this file,
it will not let you renumber the NetMail
folder. "nnn" is the task number (0-255).
This is not available in the
noncommercial version.
FDINEXIT.nnn FD FD creates this file whenever a human
caller is detected and passed onto a BBS
or other on-line service. When FD
returns, it compares the timestamp of
FDINEXIT.nnn with the timestamp of
FDRESCAN.NOW, and if they do not match, a
complete rescan (see FDRESCAN.NOW) is
performed. "nnn" is the task number (0-
255). In the noncommercial version, this
file is not task aware, and is always
called "FDINEXIT.NOW".
FDNOUSER.NOW FD Forces FD to refuse human callers. This
has the same effect as setting the "Human
callers" option, under FD's "Your
profile" menu, to "NO". The visual
indicator for this semaphore file is
"NU".
FDNOSCAN.NOW FD Forces FD to ignore FDRESCAN.NOW.
130
FDNOEXIT.NOW FD Prevents FD from exiting because of
received mail. This has the same effect
as setting the "Exit on mail" option,
under FD's "Your profile" menu, to "NO".
The visual indicator for this semaphore
file is "NE".
NODIAL.FD FD While this is not a semaphore file per
se, it triggers the display of a visual
indicator, "UD".
FDEXIT.nnn FD Forces FD to UNconditionally exit with
the errorlevel "nnn". Before FD exits, it
removes the file.
FDRENUM.nnn FD, FM FM creates this file whenever you press
<Alt-B> to renumber the NetMail folder.
When FD detects this file, it will not
place any outgoing calls until it can no
longer be found. This prevents FD from
initiating an outbound session while FM
is renumbering the contents of the
NetMail folder. "nnn" is the task number
(0-255). This is not available in the
noncommercial version.
ROUTE.FD FD While this is not a semaphore file per
se, it is used to determine if the
NetMail folder has to be rescanned (see
FDRESCAN.NOW). If the timestamp of this
file has changed since FD last checked
it, a rescan is forced.
131
24 Batch files
FD will, in most cases, be run from a DOS batch (.BAT) file. When it
terminates, it will return certain errorlevels that you can trap for
in your batch file.
24.1 Errorlevels
1 Internal error
2 External error - missing files, paths, etc.
3 Insufficient available disk space (less than 32 KB)
4 (reserved)
5 Unable to initialize modem
6 Incorrect FOSSIL version
7 FOSSIL not loaded or detected
8 FrontDoor already loaded, issue EXIT to return
9 (reserved)
10 User break
11 - 30 (reserved)
31 - 255 User definable errorlevels
If you invoke the Terminal from DOS by running FD /T, it will always
terminate with an errorlevel of 10 (User break), the same applies
when you have specified "Terminal-only" in FDSETUP.
24.2 Categories
The various errorlevels can be organized into four basic
categories:
Mail received When mail is received, you can choose to exit
to the batch file to run external mail
processing utilities, such as TosScan, etc.
User break/errors When you press <Alt-Q> from the FD's main
menu or when errors occur.
BBS calls If you are running a BBS under FD, it is
necessary for FD to exit with an errorlevel
indicating the baudrate of the call. The line
is still active when FD exits to the batch
file, the BBS software is loaded and the
caller will be able to access the BBS.
External events The errorlevels defined in FDSETUP's event
manager.
132
24.3 Loading BBS software
There are two methods that can be used to invoke BBS software
when the Mailer detects a non-mail (human) call. The first uses
different batch file labels for the various baudrates and the
second one uses the same label for the various baudrates. The
second method relies on the "Create .BAT file" option in FDSETUP
(under Mailer > Errorlevels).
24.4 Different labels
@echo off
rem --- We end up here after every BBS call
:loop
C:
CD \FD
FD
rem --- Check errorlevels returned by the Mailer
if errorlevel 200 goto b9600
if errorlevel 199 goto b2400
if errorlevel 198 goto b1200
if errorlevel 197 goto b300
if errorlevel 100 goto mailIN
if errorlevel 10 goto userBRK
if errorlevel 1 goto FDerror
:mailIN
rem --- Process possible echomail, etc.
tosscan toss
tsutil link -t
goto loop
:b9600
Load BBS software for incoming call at 9600 bps
goto loop
:b2400
Load BBS software for incoming call at 2400 bps
goto loop
..
..
133
:userBRK
cls
@echo User break.
goto done
:FDerror
@echo Mailer returned an error (1-9)
:done
While this option works just fine for a environment where it is
not critical that the BBS software knows about upcoming events
etc. it is somewhat limited.
24.5 Same label
@echo off
rem --- We end up here after every BBS call
:loop
C:
CD \FD
FD
rem --- Check errorlevels returned by the Mailer
if errorlevel 200 goto bbsCALL
if errorlevel 199 goto bbsCALL
if errorlevel 198 goto bbsCALL
if errorlevel 197 goto bbsCALL
if errorlevel 100 goto mailIN
if errorlevel 10 goto userBRK
if errorlevel 1 goto FDerror
:mailIN
rem --- Process possible echomail, etc.
tosscan toss
tsutil link -t
goto loop
:bbsCALL
rem --- Load DOBBS.BAT, created by the Mailer if
rem the "Create .BAT file" option is enabled.
dobbs
:userBRK
cls
@echo User break.
goto done
134
:FDerror
@echo Mailer returned an error (1-9)
:done
24.6 DOBBS.BAT
This is the batch file created by FD when you have the "Create
.BAT file" option enabled. It contains the speed at which the
call came in, the COM port, number of minutes left till the next
event and possibly a string indicating ARQ, MNP etc.
The commercial version inserts the task number (0-255) between
the number of minutes left till the next event and the possible
ARQ/MNP string.
For a call coming in at 9600 BPS with ARQ, 30 minutes left till
the next non-user event, on COM port 1 the DOBBS.BAT file would
contain:
exebbs 9600 1 30 /ARQ
For a call coming in at 2400 BPS, two hours left till the next
non-user event, on COM port 1, the DOBBS.BAT file would contain:
exebbs 2400 1 120
24.7 EXEBBS.BAT
This is the file you have to create. It should handle everything
required for the BBS software you are running, including
exporting mail after users have logged off, etc. The last
statement of your EXEBBS.BAT file should be the name of the big
(main) batch file. Here is a sample of an EXEBBS.BAT file:
coolBBS -b%1%4 -p%2 -t%3
if errorlevel 200 goto newmail
if errorlevel 40 goto fatal
run
:newmail
cls
@echo User entered echomail, let's send it!
tosscan scan
run
:fatal
cls
@echo A fatal error has occurred in coolBBS
135
Since DOBBS.BAT calls EXEBBS.BAT with various information, it
can be used to pass parameters to the BBS software. The
result of the above EXEBBS.BAT file would expand to:
coolBBS -b9600/ARQ -p1 -t120
If a BBS call came in at 9600, the COM port is one, the
number of minutes till the next non-user event is 120 and the
optional (%4) string contained /ARQ.
The text RUN, refers to the original (main) batch file, in
which we bring the Mailer back up again. When the BBS
software (coolBBS in the above examples) terminates,
EXEBBS.BAT will trap two errorlevels and then invoke
RUN(.BAT) again.
24.8 Flow (batch files)
Complicated? Here is the actual file flow between RUN, DOBBS and
EXEBBS:
+-> RUN.BAT Loads FD and performs all EchoMail and
: : error handling. When a non-mail (human)
: : call is detected, it loads DOBBS.BAT,
^ V created by FD.
: :
: :
: DOBBS.BAT Created by FD. It calls the EXEBBS.BAT
: : file with the baudrate, port, remaining
: : time till the next non-user event, and
^ V and possibly the /ARQ parameter.
: :
: :
: EXEBBS.BAT Called by DOBBS.BAT with the above
: : described parameters. Loads the BBS
: : software, processes newly created
^ V mail (if any), and finally returns to
: : RUN.BAT.
+--<--+
136
25 Multi-tasking
FrontDoor can be used together with most multi-tasking programs. It
has been tested with DESQview, PC-MOS/386, OS/2 1.3 DOS Box,
DoubleDOS, Multilink and Taskview. It will automatically detect most
multi-tasking software. My personal suggestion would be DESQview. One
of the best multi-taskers around for PC/MS-DOS.
25.1 NS16550
If you are running FrontDoor under a multi-tasker or in a LAN
environment, I suggest you replace your 8250 or 16450 UART chip
with a NS16550AN or NS16550AFN. These are available from several
electronics outfits for somewhere between USD 17 and USD 23.
The 16550 family of UARTs have internal buffering (FIFO) and will
improve performance in multi-tasking and LAN environments. Both
BNU and X00 has direct support for the 16550 family and can be
used without modifying your command-line parameters when loading
them.
25.2 DESQview
FrontDoor will request a virtual screen buffer from DV and write
to it. The result is very fast and very well behaved screen
writes. Here are the settings I use with DESQview (2.2x / 2.3x):
Keys to Use on Open Menu FD
Memory Size (in K) 250
Options:
Writes text directly to screen N
Displays graphics information N
Virtualize text/graphics (Y,N,T) N
Uses serial ports (Y,N,1,2) 2
Requires floppy diskette N
Advanced Options:
System Memory (in K) 0
Maximum Program Memory Size (in K) <empty>
Script Buffer Size 0
Maximum Expanded Memory Size (in K) 0
Text Pages 1
Graphics Pages 0
Initial Mode <empty>
Interrupts 00 to FF
137
Maximum Height 25
Starting Height 25
Starting Row 1
Maximum Width 80
Starting Width 80
Starting Column 1
Close on exit (Y,N,blank) N
Uses its own colors Y
Allow Close Window command Y
Runs in background (Y,N,blank) Y
Uses math coprocessor N
Keyboard conflict (0-4) 0
Share CPU when foreground Y
Share EGA when foreground/zoomed Y
Can be swapped out (Y,N,blank) N
Protection level (0-3) 0
25.3 DoubleDOS
Smart multi-tasking software allocates a virtual screen buffer
for each task. Applications can then ask the multi-tasking
software where it should write and the multi-tasker handles the
screen updates. DoubleDOS 5.0, however, is using a different
method.
Every time you switch tasks from the keyboard, the screen-buffers
change. So there is no easy way for the software running under
DoubleDOS to detect this. In DoubleDOS 5.00, there are two
options that allows you to run FrontDoor under DoubleDOS just
fine. You MUST run FrontDoor in the TOP section for the two
methods below to work.
DISPLAY=TEXT If your system has a MCGA, CGA, EGA or VGA
card installed, there is extra memory
available on those cards for graphics, etc.
DoubleDOS can use some of that memory for
each of its screen buffers. To enable this,
add DISPLAY=TEXT to your DDCONFIG.SYS file.
REFRESH If you have a text-only adapter (MDA) there
is most likely no extra memory available on
the card. Add REFRESH by itself on a line to
your DDCONFIG.SYS file. This will tell
DoubleDOS to repaint the screen if the other
task is bleeding through.
138
X00 and DoubleDOS When using FrontDoor, X00.SYS and DoubleDOS,
do not assign the COM ports in DDCONFIG.SYS.
If you have problems with your clock, try the
DEFER option in X00.
Make sure you replace ANSI.SYS with DBLDANSI.SYS.
The BOTTOM partition should initialize before the TOP partition.
In other words, if you are loading FrontDoor in the BOTTOM
partition, try to delay the initialization of the TOP partition.
25.4 Multilink
I would personally not recommend anyone using FrontDoor with
Multilink. I have never successfully executed any program under
Multilink for longer periods of time than momentarily.
139
26 Converting from other mail systems
If you were using SEAdog or D'Bridge before you started using
FrontDoor, you should have little trouble converting to FrontDoor.
The routing and message handling used by these two mail systems is
very similar to the way things are done with FrontDoor.
If you are converting from BinkleyTerm, Opus, or Dutchie, however,
there are a few things you should know and make sure you have done
before you install FrontDoor.
The main difference between FrontDoor and BinkleyTerm or Opus is that
FrontDoor does not use oMMM, the static message packer written by Bob
Hartman. We see the oMMM approach as a black hole from which there is
no return. This is not true in some cases and there are advantages of
using oMMM type packers instead of the method used by FrontDoor.
oMMM will create what we call static bundles, where each system has a
control file that tells the Mailer what files and messages to send to
what systems. FrontDoor will NOT recognize oMMM type bundles
(packets) so before you fully convert to FrontDoor, you must make
sure that all the oMMM type mail is sent before you convert to
FrontDoor.
You can use FrontDoor to send the remaining oMMM type mail by
attaching the files manually with FrontDoor's Editor (FM) or a robot
utility such as XRobot, but you will need a utility with which you
can determine which file belongs to which system before you can do
this. So it might be easier for you to tell BinkleyTerm or Opus to
send its remaining mail before you do the conversion.
140
27 Help systems
The following systems and persons can be contacted if you have
problems or questions regarding FrontDoor. You will most likely
find the latest noncommercial version on these systems as well.
Bruce Bodger 1:1/101 USA
Mark Howard 1:260/1 USA
Mats Wallin 2:201/329 Sweden (Europe, Main)
Stig Jacobsen 2:231/16 Denmark
Lars Eriksson 2:222/150 Finland
Zbigniew Borowiec 2:480/6 Poland
Sascha Vogt 2:310/5 Austria
Ulrich Bartelt 2:24/4 Germany
Mark Kerr 2:263/301 Ireland
Michael Bravo 2:50/200 USSR
Peter Janssens 2:512/1 Netherlands
Orlando Castillo 2:346/4 Spain
Patrick Oetiker 2:30/5 Switzerland
Nick Parker 2:253/165 United Kingdom
David Nugent 3:3/101 Australia
Ricardo Sandor 4:4/104 Latin America
Ralph Colyn 5:5/103 RSA
Larry Leong 6:6/101 Asia
The above people are NOT responsible for helping you with commercial
queries and/or problem.
141
28 Sample (PCP) script
This script was written by Eric Larson, 1:260/330@fidonet and is
intended as a sample PC Pursuit script.
; PCP script for FrontDoor version 2.0x
; Eric Larson, 1:260/330.0, 8/11/91
; modified from script supplied in FD 1.99 documentation
;
; You must modify this script in at least 3 places:
;
; 1: Indial Number
; 2: PCP ID Number
; 3: PCP Password
;
; You may also want to modify the script for your modem
; or types of systems you call. See notes in script.
; For further information, see PCP documentation on
; Net Exchange BBS. To connect to the Net Exchange, type
; "C PURSUIT" at the Telenet @ prompt.
;
debug ON
setport 2400 ; Redundant if you have locked your Fossil
; If you have a 1200 indial :-(, use 1200
; here and change the hunt-confirm sequence
; to @ wait 1 <CR>
;
; Users with MNP modems should disable MNP as the buffering
; combined with PCP's packet latency will cause block position
; errors during error recovery. For HST owners, use:
;
send AT&M0<CR>
waitfor OK
;
; Others should adjust the above for their modem
; non-buffered modem owners should comment out the
; above two lines.
;
;----------------------------------
; Your Indial Phone Number Here
;----------------------------------
;
send ATDT4795372<CR>
; send ATDT4795445<CR> ; official number
; 6406 5776 5355 5372 ; alternates
;
; If you are having difficulty with your indial line, call
; PCP customer service and they may be able to give you
; an alternate number that works better.
142
case
CONNECT : >whackit
RING<CR> : fail
BUSY<CR> : fail
"NO " : fail
@default : fail
endcase
:whackit ; Attempt to "wake-up" PCP
purgein ; Telenet recommends at least
wait 2 ; a 200 ms pause between
send @ ; characters in the hunt-confirm sequence
wait 1 ; change the @ to <CR> if you call
send D ; a 1200 bps indial
wait 1
send <CR>
waitfor TERMINAL=
send D3<CR> ; Preferred terminal type
waitfor @
;--------------------------
; Your ID and Password Here
;--------------------------
:outdial ; Dial PCP city
purgein
retrycount 5
send C @OUTBOUND,YOURPCPID<CR> ; Your ID Here
waitfor PASSWORD
send YOURPASSWORD<CR> ; Your Password Here
CASE
CONNECT : >local ; Gotcha!
BUSY : >outdial
"NOT " : fail
@nocarrier : fail
@default : fail
ENDCASE
:local ; Initialize Outdial
purgein
send <CR>
wait 1
send I<CR>
send ATZ|
timerset 15
waitfor OK
send @|
waitfor @
143
;
; Setup PADS
;
; Note - if you are calling a SEAdog system,
; change the SET and RST 5:1 and 12:1 to 5:0 and 12:0
; as SEAlink is not transparent to software flow control
;
; If you only call WaZoo systems, use 5:1 and 12:1 for
; fewer errors and greater reliability.
;
send SET?<sp>1:0,7:8<CR>
;
waitfor @
;
; send RST?5:1,12:1<CR>
;
; waitfor @
send CONT<CR>
send ATH0Z<CR>
waitfor OK|IDLE
send <ENQ><CR> ; Turn on RV Mode
waitfor *
purgein
timerset 50
wait 2
send D@LOCALNUM<CR>
purgein
case
ANS : >landing
ONLINE : >landing
BUSY : fail
FAILED : fail
"NO CARRIER" : fail
"NO DIAL TONE" : fail
"NO DTR" : fail
VOICE : fail
@default : fail
@nocarrier : fail
endcase
:landing ; Landing on Pluto
wait 7 ; wait for PCP messages to clear
purgein
session
;/* End Of File */
144
29 Commercial inquiries
To use FrontDoor in a commercial environment, a commercial licence
must be obtained. The commercial version of FrontDoor includes
numerous features not found in any other software package (including
the noncommercial version of FrontDoor). Eligible users of the non-
commercial version of FrontDoor may also benefit from the commercial
features, and can enjoy a special "SysOp's Discount" at the time of
writing this.
The easiest way to receive up-to-date information of features,
availability, pricing and a list of local distributors and resellers
of the commercial version, is to file request FDINFO from one of the
following main distribution sites:
Online Communications, Inc. Telephone: +1 207 941 1110
22 State Street Modem: +1 207 990 3511
Bangor Maine 04401 Email: 1:132/300@fidonet
USA 1:132/301@fidonet
Advanced Engineering sarl Telephone: +352 358 725
8, am For Modem: +352 355 936
L-5351 Oetrange Email: 2:270/7@fidonet
Luxembourg ae@fido.rmi.de
The file FDINFO is also available from some FrontDoor Help Nodes
around the world. Please, make sure that you have the latest
available order forms before placing an order!
The FDINFO package contains information about various FrontDoor-
related utilities, such as TosScan, the conference mail package.
145
30 Developer notes
A separate package with information regarding FrontDoor is
distributed under the name FDDEV. It contains structures and
technical information directed towards authors of FrontDoor
utilities. If you are planning on writing a utility with explicit
support for FrontDoor, make sure you grab a copy of the FDDEV
package.
146
31 Technical specifications
FrontDoor was written using Zortech C++ 2.18, TASM 2.0, and Turbo
Pascal 6.0. It uses direct-to-screen writes, and properly supports
virtual screen environments, such as the one provided by DESQview.
FrontDoor features support for several FTSC (FidoNet Technical
Standards Committee) standards and standard proposals, including:
FTS-1 Basic FidoNet Technical Standard
FTS-4 EchoMail Specification
FTS-5 The Distribution Nodelist
FTS-6 YooHoo NetMail Handshake
FTS-7 SEAlink Protocol Extension
FTS-8 BARK File Request Protocol Extension
FSC-15 FOSSIL 5.0 Documentation and Specifications
FSC-25 AVATAR Video Specifications
FSC-37 AVATAR 0+ Video Specifications
FSC-39 A type-2 packet extension proposal
FSC-41 MSGID / REPLY: A proposal
FSC-46 Proposed product identifier
FSC-53 Specifications for the ^aFLAGS field
FSC-56 EMSI/IEMSI protocol definition (EMSC-001)
FrontDoor's FTSC product code is 0x0C (or 12 decimal).
The proper nodelist file request flag for systems using FrontDoor is
XA.
FrontDoor's Editor (FM) allows you to share the Hudson Message Base
together with other programs, such as RemoteAccess, following the
RemoteAccess/FrontDoor HMB sharing specifications.
147
32 Credits
Thanks to..
..Anders Johansson, Andrew Khoo, Dave Hatch, Bill Bolton, Bill Dunn,
Bjorn Bogfelt, Bob Rudolph, Boris Osadciw, Chris Homrighausen (hey
bro!), Chris Van Tuin, Chris Baker, Clement Studer, David Kerley,
Dieter Soltau, Eelco de Graaff, Fred Vlinkervleugel, 1B Systems
Management Ltd, Ken McVay, Darryl Gregorash, Carina Carlsson, Lovisa
Hagberg, Gareth McClean, Joop Mellaart, Horst Buhl, James Henthorn,
James Smith, Online Communications Inc., Jan Crommenacker, Jan
Jonsson, Jeff Wolach, Jerry Hindle, Jim Faucette, Gerard van der
Land, Joakim Hernberg, John Huls, Jon Schneider, Ken Doebler, Kim
Lykkegard, Malte Erikson, Mario Diaz, Mark Howard, Mats Knuts, Mats
Wallin, Peter Adenauer, Werner Berghofer, Randy Harner, Rick
Petersen, Rick Siegel, Robin Valle', Ruud de Bruin, Scott Samet,
Thomas Stjernstrom, Thomas Sundblom, Todd Lehr, Maurie Halkier, Tony
Wagner, Ulf Hedlund, Ulf Jungjohann, Andreas Polz, David Nugent, Tom
McGivern, Andrew Farmer, Steve Froeschke, Orlando Castillo, Eric
Larson, Paul Marwick, Tommy Svensson, Bob Beilstein, Bruce Bodger,
Michael Butler, Paul Schlyter, Bill Kraski, Alexander Holy, Lars
Eriksson, Fabiano Fabris, Bob Snowdon, Aaron Schmiedel, Mike Janke,
Peter and Irene Janssens, Jeff Murphy, Gary Funk, Luca Leone, Andrew
Milner, Jan Berglund, Sascha Vogt, The Crocodile Club in Karlsruhe,
Michael Raschke, Bofferding Breweries, Mark Kerr, Robert Hessler,
Mats Birch, Mats Jansson, John Barton, Dirk Astrath, Glen Johnson,
Ulf Nilsson, Ed Meloan, Nick Parker, Jim Louvau, Luc and Nathalie,
Bob Hoffman..
All the help nodes.
..Tom Jennings, Felix Kasza, Bob Hartman, Chris Irwin, Chuck
Forsberg, Henk Wevers, Randy Bush, Ray Gwinn, Thom Henderson, Vince
Perriello, Wynn Wagner III, Mike Ratledge, Rick Moore, G. Adam
Stanislav, Doug Boone, Ralf Brown, jim nutt, Maximilian Hantsch.
148