home *** CD-ROM | disk | FTP | other *** search
- =================================================================
-
- The
-
- $ R / O
-
- R E A D O N L Y
-
-
- -=( November 1986 Issue )=-
-
-
-
- The monthly news magazine of the Tampa Bay Kaypro User's
- Group and the DataCOM Super Systems(tm)
-
- =================================================================
- News and reviews of programs, hardware, and peripherals for users
- of microcomputers with CP/M, MP/M, MS-DOS, PC-DOS, or TurboDOS
- multi-user operating system.
- =================================================================
-
- Steven L. Sanders - Editor (Sysop)
-
- =================================================================
-
- The DataCOM Super Systems(tm) is a "state of the art" multi-user
- remote database with 115mb of files online. An annual fee of
- $35.00 is required for access, an application may be downloaded
- by calling (813) 791-1454 at 300/1200/2400 baud, (813) 796-5627
- at 1200 or 2400 baud, or send a SASE along with your request to:
-
-
- TBKUG / DataCOM Super Systems(tm)
- 2643 Cedar View Court
- Clearwater, FL 33519
-
-
- -==( DISCLAIMER )==-
-
- Articles and reviews of microcomputers, hardware, software, and
- other peripherals reflect currently advertised prices as released
- by the distributors and are included here for YOUR INFORMATION
- ONLY. The TBKUG/DataCOM Super Systems(tm) is NOT being paid
- to advertise these products and we cannot be held
- accountable for the actual retail price and/or performance
- of said products.
-
- =================================================================
-
-
- -={ WHATSNEW - New Files }=-
-
- [MS/PC-DOS]
-
- QMODEM23.ARC The latest version (2.3) of QMODEM, one of the
- premier shareware modem programs for DOS. QMODEM supports every
- known transfer protocol, has nice pop-up (and moveable) window
- displays, settable colors, script language, and the list goes on
- and on. If you've never heard of QMODEM, you should!
-
-
- PCOPY5.ARC PCOPY is a DOS command utility used to copy files
- between disks and directories on disks. In addition to just
- copying files, PCOPY also allows selection criteria to be
- specified to better qualify the files to be copied. PCOPY
- provides a safer way to copy files than is provided by the DOS
- COPY command. It warns you if a file is about to be overlayed
- and lets you have complete control over the copy operation.
-
-
- VCRDBASE.ARC is a program used by a person who needs an easy and
- structured way of keeping track of all the movies he or she has.
- VCRDBASE is quite unique in that it uses a Linked List data
- structure for record management and sorting. In this data
- structure, the Header file, HEADER.DAT, contains the record
- number of the first alphabetical movie. That movie (the first
- alphabetical) contains a forward link and a backward link. The
- forward link contains the record number of the next alphabetical
- movie and the backward link contains the record number of the
- preceding record.
-
-
- GT1012-1.ARC, GT1012-2.ARC, & GT1012-3.ARC - GT Power Comm v10.12
- GT is a very nice IBM-PC modem program with all the features
- we've come to expect; pop-up help windows, settable colors, all
- standard file transfer protocols including YMODEM. Super-nice
- review buffer, complete script file language for auto-logon files
- and auto-download sessions. GT is right up there with Procomm
- and Qmodem, I use em all! However, all these rapid-fire updates
- tend to wear us collectors out. GT and ProComm have been getting
- updated every three weeks lately which makes for great confusion
- as to which is current, etc...
-
-
- DP12.ARC DataPath is used to specify directories, other than
- the current one, to be searched by executing programs, in the
- event that a file that needs to be read cannot be found in the
- current directory. DataPath requires 2162 bytes of disk space (5
- 512-byte sectors). It becomes memory resident the first time it
- is run and increases the size of the operating system by 1440
- bytes. It will run on any computer using the MS-DOS or PC-DOS
- operating systems version 2.0 or higher.
-
-
- HOTDOS2.ARC HOT-DOS is a small but powerful program that, with
- the press of the CTRL-SHIFT -- LEFT-SHIFT combination, allows any
- currently executing program to be temporarily suspended so that a
- second copy of COMMAND.COM can be loaded and run in the
- background (the aptly named HOT-DOS partition.)
-
-
- MPLANNER.ARC MANAGER'S PLANNER vers 1.00 is designed to help
- you plan your workday for maximum effectiveness. It maintains
- your schedule, organizes your daily tasks, and gives you the
- tools to keep your mind on the high priority activities which
- really deserve your attention. With MP, you can put your
- promises and future obligations out of your thoughts until you
- are ready for them, and still never forget. Run MP once a day,
- either at the end of your workday or first thing in the
- morning. At the end of your session, MP will print out a
- plan for your workday.
-
-
- TELIX110.ARC Excellent communication program v1.10 Very fast &
- Clean I must admit that I've sort of snuck this one on the system
- for the moment by using the date of release of the file rather
- than today's date. I'll cahnge that later after I've had a
- chance to really put this new version of Telix through its paces.
-
-
- PCGAZ108.ARC PC-Gazette magazine 10/86 edition. A very inter-
- esting graphic-oriented monthly magazine with programming tips
- for Turbo Pascal and 'C' programmers. Some very nice graphic
- displays as well. Seems to be getting better than some of the
- earlier issues.
-
-
- MASTRKEY.ARC The search for a shareware program that unerases on
- large hard disks formatted with DOS 3.x is over. This one works,
- and it's easy to use and has many other powerful capabilities as
- well. Master Key is a utility that gives you full access to
- your MS-DOS disks. It is a collection of features bundled into
- one easy to use program. It is a disk editor, a file editor, a
- file manipulator, and more. It gives you the ability to work
- with individual files or the disk as a whole and lets you
- perform operations that DOS usually isn't able to provide.
- Generally, it lets you manipulate everything on your disks easily
- and with very few restrictions.
-
-
- PRCM242A.ARC This is a minor update to ProComm 2.4 that 99% of
- the users would never notice, a very obscure bug was fixed, see
- PRCM242.NEW file. For those of you who have already downloaded
- the PRCM24A, PRCM24B, and PRCM24C archives, you only need the
- PRCM242A.ARC for the new EXE file. Anyone upgrading from v2.3
- needs all three archives plus notice that there have been major
- changes in the syntax for script files.
-
- IR164F.ARC Instant Recall was designed for the busy person who
- has many ideas and doesn't know where to store them. The
- business executive. The writer. The personnel administrator.
- It was designed to replace awkward filing cabinets and
- restrictive database systems with an instant cross- referencing
- system that lets you store bits and pieces and retrieve them
- together so you can turn them into a coherent whole . And it
- lets you cut and paste information from Instant Recall's records
- right into another document without exiting from either program.
-
-
- PATCH1.ARC The hottest tool for getting into and fiddling
- with the nitty- gritty of any kind of file, or just taking a good
- look at it. It is called PATCH, and it's a "byte editor".
- What that means is that you see a HEX/ASCII display screen (it
- kinda' looks like "dump" in DEBUG) of your file, and can move
- around in it with your standard cursor movement keys, making
- changes it it in either HEX or ASCII. For futzing with binary
- files, PATCH is to DEBUG as WordStar is to EDLIN. It is a "full
- screen" byte editor.
-
-
- CAMERA.ARC CAMERA will remain resident in memory and reduce your
- available memory by 1552 bytes (not much). The program is
- invoked by pressing Alt PrtSc which will take the contents of the
- graphics screen buffer and save it in a file, the contents of the
- mode and color registers will also be saved so that the image
- will be displayed with the settings in effect when its picture
- was taken. If the image on the display screen is a graphic image
- it will be stored in a compressed mode. Text screens will be
- saved "as is", in other words a 40x25 screen will use 2048 bytes
- of storage and an 80x25 screen will use 409 bytes.
-
- ROS-PC35.ARC Remote Operating System (ROS) v3.5 by Steve Fox.
- This is the new DOS version of a very fine RBBS system that was
- originally written and developed for CP/M computers. Program
- written entirely in Borland's Turbo Pascal and distributed as
- ready-to-run compiled programs. Very easy to install for part-
- time Sysops or anyone who wants a very secure full-featured RBBS
- system. ROS even allows access to LBR and ARC files from the
- Files menu system. XMODEM CRC and YMODEM transfers are fully
- supported as well as ASCII with XON/XOFF protocol.
-
-
- -={ 720k Capacity Floppies with DOS 3.2 }=-
-
- by Dave Whittle
-
- The following procedure will format a double-sided, double-
- density diskette to allow 720KB of storage on one disk using a
- 1.2MB drive and DOS 3.2.
-
- 1) Change your CONFIG.SYS file to include the line:
-
- DEVICE=DRIVER.SYS /D:0
-
- assuming the file DRIVER.SYS from DOS 3.2 is in the root
-
- directory and drive D: is the next available logical disk, i.e.
- that you have one fixed disk but no ramdisk or external drives.
- Alternatively, if your DOS files are in a subdirectory named
- C:\DOS, and if you have a ramdisk and an extra fixed disk, then
- drive F: would be your next logical drive and the command line
- to include in your CONFIG.SYS file would be:
-
- DEVICE=C:\DOS\DRIVER.SYS /F:0
-
- The rest of the steps will assume your next logical drive is D:.
-
- 2) Reboot using DOS 3.2.
-
- 3) Insert a DS/DD diskette in the High Density drive.
-
- 4) Make sure you can access drive D: by issuing the command
- DIR D: from the DOS prompt, making sure the light on the
- High Density drive comes on. If the wrong drive or no
- drive lights up, D: is not your next logical drive. Try
- E: or whatever.
-
- 5) Respond with 'Abort' to the time-out query if the diskette
- is not already formatted.
-
- 6) Issue the command FORMAT D:
-
- 7) After the drive starts formatting, press Ctrl-Break to
- abort.
-
- 8) Issue the command DEBUG from the DOS prompt.
-
- 9) From the DEBUG - prompt, press E 40:90 <Enter>.
-
- 10) Press 57 <Enter> to change the byte from 15 or 74 or
- whatever.
-
- 11) Press Q <Enter>.
-
- 12) Again issue the FORMAT D: command, but this time let it go
- to completion.
-
- 13) Answer N to the question about formatting another.
- You have to go through steps 6-12 for each diskette.
-
- 14) Optionally, you can remove the DEVICE= command from your
- CONFIG.SYS file, or leave it in if you have memory to burn
- and think you might want to format 720K diskettes often.
-
- 15) If you get brave, experiment with skipping the first
- FORMAT D: and Ctrl-Break commands.
-
- That's it! The DS/DD diskette is now formatted to hold 720KB.
- Obviously, you can't hurt your drives, but you may want to
- exercise caution with the kinds of data you entrust to the newly
- formatted diskettes.
-
-
- -={ Tough New Computer Crime Bill Passed }=-
-
- by Wayne Rash
-
- Senate Passes Computer Crime Bill The US Senate last night passed
- unanimously the Computer Fraud and Abuse Act of 1986. The bill
- places penalties of up to $100,000 and/or prison terms of up to
- 20 years for breaking into computers used by the government or by
- financial institutions. The bill goes to the White House next,
- where a signing by Reagan is virtually assured. Under the bill, a
- person would be guilty of computer fraud if he or she caused the
- loss of $1000 or more from any computer owned or used by the
- government or any of its agencies or by a federally insured
- financial institution. The bill offers similar penalties for
- modifying or destroying government medical information. The bill
- also prohibits traffic in passwords and other information related
- to accessing these computers or where such use affects interstate
- or foreign commerce. This is an attempt by the government to
- give federal prosecutors a way to crack down on pirate bulletin
- boards and similar operations since virtually all large business
- computers, networks such as Tymnet, and services such as BIX are
- considered interstate commerce. The bill was sponsored by Sen.
- Paul Trible (R-VA) and was passed by the US House of Represent-
- atives in identical form earlier this year.
-
- Computer Fraud and Abuse Act of 1986 The Computer Fraud and Abuse
- Act of 1986, passed by the full Senate on October 1, makes some
- sweeping changes in how the federal government can deal with
- activities it considers to be criminal. For the first time, it
- will be illegal to simply use computer time on a government
- computer if you're not supposed to be there, even if you don't
- change or copy data.
-
- This is also the first time it will be a violation of federal law
- to access computers owned or used by financial institutions or
- medical facilities. While it is unclear just how far the
- prohibition of this access will go, it will serve to put a new
- weapon in the hands of federal prosecutors in their battles
- against computer criminals.
-
- One of the most significant changes is in the way the government
- determines if it has suffered loss. Previously, the government
- had to prove that the data itself suffered significant losses
- before fraud could be shown. With the passage of this bill, all
- the government has to prove is that any combination of losses
- adds up to $1000 before a person falls under the provisions of
- this bill. These losses can be counted in a variety of ways,
- including actual costs to replace data or to reprogram. They also
- include the cost of computer time, the cost of the network to
- reach the computer, as well as the costs involved with making the
- port unavailable to others. These costs can be combined from one
- incident or the combination of many incidents over a period of
- time. To be guilty of computer fraud or abuse, the person only
- needs to be performing the act intentionally and without
- authorization.
-
- The bill also provides for people who are authorized to use a
- specific computer but exceed the level of authorization they are
- permitted. This is the first time a federal computer crime
- statute has included federally insured financial institutions.
- This relates to banks, savings and loans organizations, credit
- unions, and the like. As in the case of government computers, the
- bill covers computers owned or used by these institutions. It is
- unclear whether this would include credit bureau computers that
- are accessed directly by banks. Any combination of losses must
- exceed $1000 for a case to fall under the provisions of this
- bill. Cases involving the breaking into of medical computers
- don't have the $1000 threshold. In those cases, any change that
- modifies or impairs medical diagnoses or treatment records would
- cause the person doing so without authorization to be dealt with
- according to the provisions of the bill.
-
- In what might put a crimp on pirate bulletin boards, the bill
- prohibits traffic in passwords or other similar information
- needed for computer access. A bulletin board operator would have
- to do this knowingly and intentionally, which would protect
- operators in those circumstances where a message containing this
- information was posted without the operator's permission or
- knowledge. The bill prohibits traffic in passwords or similar
- access information for any computer engaged in interstate or
- foreign commerce. In the hearings on the bill, it was the obvious
- intent of the drafters that this provision would include services
- such as Tymnet and Telenet and systems such as BIX, CompuServe,
- and the Source.
-
- The Computer Fraud and Abuse Act of 1986, S.2281, was sponsored
- by Senator Paul Trible (R-VA) and was passed unanimously by the
- Senate. If signed into law by the President, the bill will amend
- title 18 of the United States Code.
-
-
- -={ TROJAN PROGRAM ALERT }=-
-
- The following has been posted on GEnie, "General Electric Network
- for Information Exchange," IBM Roundtable BBS special alert
- notice. Seems SOFTGUARD may be distributing a TROJAN "unprotect"
- program to erase disks and bolster their "shrinking" copy
- protection business.
-
- 86Sep19 02:15pm from Andy Meyer
- 86Sep18 02:46pm from Ted Mozer @ Brick
- **** DANGER !!!! Data Destroying Program !!!
-
- The File called SUG.ARC (or SUG.COM) is purported to be an
- unprotect for Softgard. It is, in reality, a real Worm of the
- worst magnitude! This little Gem will ask you to put your
- ORIGINAL Softgard protected disk in the drive, and then BAM!! it
- displays this message:
-
- "You have violated the license agreement under which you received
- the software. All your data has been destroyed. This destruction
-
- constitutes prima facia evidence of your criminal violation. If
- you attempt to challenge Softguard Systems, Inc. or the software
- vendor in court, you will be vigorously counter-sued for
- infringement and theft of services; we believe that our case will
- have more merit to it than yours. If you have any questions con-
- cerning this matter, you are invited to contact our lawyers at
- the following address:
-
- Softguard Systems Incorporated
- [address and telephone number given].
-
- We'll be happy to explain to you the precarious legal position
- you're in. We wish you good luck in restoring your software from
- backups and we hope that in the future you'll act more like an
- honest user and less like a thief.
-
- Happy Computing."
-
- ... AND IT IS SERIOUS!!
-
- It will look for drives A: & B: and, get this, a Drive C: or
- better!! In other words, it will wipe out the FAT on your hard
- disk too, just to "teach you a lesson". Attorneys are presently
- looking into what can be done to stick this up the lower
- abdominal region of the person or persons responsible for its
- existence.
-
- .. IF YOU HAVE IT, GET RID OF IT !!! //
-
-
- Interesting? Here's one from the the Atlanta PC User's Group BBS,
- home of the Lone Victor:
-
- Date: 09-03-86 (17:14) Number: 3265
- To: LONE VICTOR Refer#: NONE
- From: BILL MOSS Recv'd: YES
- Subj: SUG.ARC Sec'ty: PUBLIC MESSAGE
-
- Please take a look at SUG.ARC which purports to unprotect
- Softguard, but destroys the diskette by erasing all files but not
- the FAT. It appears to be in retaliation for your work. More
- than ever we need your help with SOFTGUARD 3.00. The lecture
- that goes along with SUG.ARC is too much!!!
-
-
- Assuming that Sofguard really did create this file, I have the
- following comments.
-
- First, Softguard's battle (battle? you might prefer to call it
- terrorism) against protection busters is almost moot, for most
- major software publishers have dropped the idea of copy-
- protection altogether. Perhaps this very fact has put
- Softguard's management in a mood bad enough to lash out thus.
-
- Second, Softguard's legal position seems quite shakey to me. Last
-
- year Vault corporation announced a software protection scheme
- that would, if it detected a fradulent effort to copy the
- software, make "Vietnam look like a birthday party" (or some such
- thing) by planting a worm that would slowly but surely destroy
- the user's files. When Vault announced its worm-based copy-
- protection scheme, many knowledgeable people expressed the
- opinion that Vault was likely to be liable for damages if people
- lost valuable data because of the scheme. What Softguard seems
- to be doing is definitely more vicious. Add together a probably
- unenforcible license agreement (to which Softguard isn't even a
- party as far as the user is concerned) and clear evidence of a
- vicious attempt to destroy the user's data, and you have a pretty
- good case against SUG.ARC's creator. In fact, you could very
- easily create a test case by (a) taking a legally-purchased copy
- of Softguard-protected software; (b) unpacking it without ever
- reading the "license agreement" in a state other than the handful
- (such as Lousiana and Illinois) that attempt to make such
- agreements enforcible; (c) having some valuable software on your
- hard disk, (d) "accidentally" destroying any backup copy already
- provided, and (e) trying to make a backup copy of the original
- with the help of SUG.ARC. It would be interesting to see what
- would happen if you then sued Softguard for damages.
- Interesting, but not very surprising.
-
- I think therefore that the Softguard folks (if SUG.ARC did indeed
- originate from them) are relying on the individual not having the
- financial resources to sue them or to withstand a long legal
- battle if they sue him. It's therefore a strategy of
- intimidation.
-
- (As an aside: That such a strategy of intimidation could be a
- viable one demonstrates a major flaw in this legal system.
- Justice costs a lot, sometimes so much that one can't afford it.
- There are several reasons for this, all avoidable, but none
- appropriate for discussion in this RT or under this topic.)
-
- How do users fight back?
-
- Perhaps we won't have to. It may be enough that the presence of
- this dangerous file be made widely known.
-
- Possibly as a result of the public outcry that followed its
- announcement of the worm scheme, Vault went into Chapter 11
- bankruptcy -- poetic justice, I think. This left Softguard with
- a near-monopoly on the software protection business in the IBM PC
- world.
-
- If the SUG.ARC file is indeed Softguard's creation, then it seems
- to me they are following Vault down the Yellow Brick Road (or is
- it the garden path?) -- and I look forward to more poetic justice
- when the public outcry occurs again.
-
-
-
-
- Until next month - happy computing! Steve Sanders - Editor.
-
-
- {eof}
-