home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1994 #1
/
monster.zip
/
monster
/
WILDCAT
/
WKEYS107.ZIP
/
WKEYS.TXT
< prev
Wrap
Text File
|
1994-02-21
|
15KB
|
325 lines
WILDKEYS(TM)
Version 1.07 - Feb. 1994
Triad Solutions, Inc.
P.O. Box 421055
Plymouth, MN 55442-1055
(BBS) 612-525-9632 1200-16.8 USRDS
Copyright (c) 93 by Christopher J. Grossmeier
ALL RIGHTS RESERVED!
Revised: Feb. 1994
What is WILDKEYS?
~~~~~~~~~~~~~~~~~
WILDKEYS is a simple utility that allows a Sysop to modify a
Wildcat! v3.x file database so that all files have the maximum
usable KEY WORDS. It simply removes all the critical words from
the sixty character description and places them into the KEY
WORD fields in you ALLFILES database.
WILDKEYS also becomes useful for systems that process files with
an automated process. If your system runs such programs as
WCFF, you may notice that these file tossers are not generating
keywords for your files in the database. With WILDKEYS, you can
selected one of these automated areas and generate keywords for
all the files within it. This saves you the time of manually
entering them after being processed.
C O N T E N T S
~~~~~~~~~~~~~~~~~
Legal Stuff
Registration
WILDKEYS' Command Lines
WILDKEYS' Trouble Shooting
What is Shareware?
L E G A L S T U F F
~~~~~~~~~~~ ~~~~~~~~~~~
WARRANTY
--------
WILDKEYS IS SUPPLIED AS IS. THE AUTHOR DISCLAIMS ALL WARRANTIES,
EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THE
WARRANTIES OF MERCHANTABILITY AND OF FITNESS FOR ANY PURPOSE.
THE AUTHOR ASSUMES NO LIABILITY FOR DAMAGES, DIRECT OR
CONSEQUENTIAL, WHICH MAY RESULT FROM THE USE OF WILDKEYS.
COPYRIGHT NOTICE & LICENSE
--------------------------
WILDKEYS is distributed as SHAREWARE. Under this concept you may
use the SHAREWARE (UnRegistered) version for a reasonable period
of time, which I consider to be 30 days, after which you must
register your copy or discontinue usage all together. The Trail
Version contains all features described in the documents and is
NOT CRIPPLED and will NOT EXPIRE in any way.
ACKNOWLEDGEMENTS
----------------
This program was written using Turbo Pascal v7.0 from Borland
International, Scotts Valley, CA.
This program used routines from Object Professional v1.20 and B-
Tree Filer v5.40 from TurboPower Software, Colorado Springs, CO.
Wildcat! (TM), and QmodemPro (c) Mustang Software, Bakersfield,
CA. DesqView (c) 1985-1993 by Quarterdeck Office Systems.
R E G I S T R A T I O N
~~~~~~~~~~~~~~~~~~~~~~~~~
Registration to WILDKEYS includes:
* Free upgrades for one year.
* Removal of registration reminder screen.
To register WILDKEYS, fill out the registration form included on
this distribution disk (WKEYS.REG) and send with a check or
money order (in US funds only) for the appropriate amount or
complete the MasterCard/Visa/Amex information. You can also
register by credit card online at the Freezing Point BBS.
_____________________________________________________________
Mailing Address: FIDO ID: 1:282/85
ATTN:Chris Grossmeier RIME ID: TRIAD
TRIAD SOLUTIONS INC. BBS: (612)525-9632
P.O. Box 421055 Voice: (612)525-9635
Plymouth MN 55442-1055
Internet : chris.grossmeier@triad1.com
_____________________________________________________________
Upon receipt of the appropriate registration fee, we will
acknowledge the registration by U.S. mail and:
* Provide the user with the codes necessary to remove
the registration reminder screen.
* Provide the user with the registration number
entitling the user to update and telephone support.
The registration fee is for the use of a single copy of WILDKEYS
by ONE individual, on a Single BBS.
W I L D K E Y S B R I E F S U M M A R Y
~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~
WILDKEYS was written to fix the annoying problem of to many
garbage Key Words in the Wildcat! Database. It doesn't
necessarily reduce the number of key words. More often it
actually creates more. What it does do, is create Key Words
that are of use to the user. It will generate key words from
the 60 character short description for each file. In generating
key words, it strips out many of the unnecessary words that are
rarely or never searched for. The list, is brief, but will
reduce the number of wasted keys in your database.
Stripped Keys Words :
OF , THE , AT , THIS , FOR , FROM , TO , YOUR ,
YOU , IT , THAT , JUST , WAS , WHEN , AND , OR ,
NOR , BUT , YET , SO , OUR , IF , AN , AS , IN ,
BE , BY , IS , DO , ON , US
A , B , C , D , E , F , G , H , I , J , K , L , M
N , O , P , Q , R , S , T , U , V , W , X , Y , Z
1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 0 and all
number combinations.
( * Note: Numbers are stripped by default, but
can be kept with a /N on the command line. )
Other keys words can be excluded by adding or removing them from the
BADKEYS.LST file. This file should be located in the same directory
that WKEYS.EXE resides in.
The WCHOME option is read if it is present in the current environment.
If WCHOME is not found, WKEYS assumes that it is being run from the
WC home directory itself. Wkeys will also read the current NODE
number if set in environment. WCNODEID=### for Multi-Line use
where ### is the current node number.
W I L D K E Y S C O M M A N D L I N E S
~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~ ~~~~~~~~~~~
WILDKEYS offers a complete set of command line options to allow
users to create special batch files to automate processing.
Command Line Switches
/? : Help for command line options.
/F : Turns on FAST MODE for Single Line BBS',
or if no nodes are running in a multi-line
enviroment.
DEFAULT IS OFF ( Multi-Line Mode )
This option will use a faster file lock procedure that will
increase the processing speed. However, it will not allow other
nodes to access the fileblock while it is running. This
important if you wish to process the database as fast as
possible. The down side, all node MUST be down. This option
works well in a Batch situation. If all nodes are down for
events, this can process the filebase in a minimal amount of
time.
/N : Keep all numbers as valid key words.
DEFAULT IS TO SRTIP ALL NUMBERS
Few users will ever do a search for a key word that is a number.
WKEYS will STRIP ALL NUMBERS BY DEFAULT. This means that it
also strips out version numbers, the word OS/2 to just OS, Gif
resolutions if present, etc. Any number will be removed. The
/N option will KEEP all numbers for sysops who see a definite
need for numbers in their Key Words.
/A#[-#] : Define an Area Range to be processed.
DEFAULT IS AREA 1 to AREA 1000
If you see a need to process only a small area, or exclude an
area, you can process any given range of areas with this option.
If the areas that you desire to process are 10 to 20, then use
/A10-20. If you only wish to process area 10, then use /A10.
Only one range can be defined at the present time.
/1 : This option is start the Database at RECORD 1
DEFAULT IS TO START WITH LAST RECORD MODIFIED BY WKEYS
Wildkeys process the database by record number. It does not
process in area order or alphabetical order, rather, it process
in the order in which they appear in the database. This
increases the speed in which WKeys processes the database. When
Processing, WKeys will log the current record to a file called
WKEYS.CNT. In the event that you should have to stop
processing, or Wildkeys should stop for some unforseen reason,
you can continue processing from the last file accessed simply
by restarting WKEYS. When you restart, you can start where you
left off simply by restarting Wildkeys. If you need to restart
from record on, add the /1 at the start to begin the process at
the begining.
/@name : Process a single file name in the database.
Wildkeys has the ability to process a single file. This option
usually used in a upload hook batch file. In most cases, the
batch file would look like this :
WKEYS /L%1
This will process a single file passed from Wildcat!. The %1
can be just a filename or a filename with path. Wildkeys will
strip the %1 to just the filename. In most cases, this option
will be used while the BBS is running. For this reason, you
will want to avoid the /F option in conjunction with the single
file option. The single option will work in conjuntion with all
other option switches.
/Lname : Process a list of file names in the database.
Wildkeys has the ability to process a list of files. These file
names can be either just file names or paths and file names.
Wildkeys will strip out all path information on the data
contained in the text file. The name of the text file itself
can contain the path where the text file is located. This
option was created to process a list of files added to the
database that we added by another third party utility. Example:
WKEYS /Lc:\wc30\wcff\wcff.lst
This example would process a list created with the name of
WCFF.LST. All of the other options will work with the list
option. The /F option should only be used when the bbs is not
running.
W I L D K E Y S T R O U B L E S H O O T I N G
~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
If for some reason, WILDKEYS should not finish processing your
database, there are some steps you can take to correct the
situation. First off, be certain you have a CURRNET BACKUP
available. Most problems can be diagnosed with minimal
difficulty if a backup was created before running WKEYS.
First, did you run Wilkeys in a single or multi-line mode.
WILDKEYS will not operate correctly if the /F option is invoked
and the BBS is still running in the background or on a separate
node in a workstation environment. The /F or Fast option
performs a different file locking routine that could cause
WILDKEYS of Wildcat! to crash if both are running. The default
mode of WILDKEYS, assumes that you are running WILDKEYS in a
multi-line environment.
Second step is to check to see what record was involved. If you
know the file name, you can view that file with either Wildcat
or the Pro series to see if indeed the record was corrupt. In
the event that the database was corrupt, run WCREPAIR, provided
by Mustang Software, Inc. with Wildcat!, to verify and rebuild
the database into a known stable format. Again, verify the
suspect file, and any file near it before re-executing WKEYS.
**********************************************************************
W H A T I S S H A R E W A R E ?
~~~~~~~~~ ~~~~~ ~~~~~~~~~~~~~~~~~~~~~
Shareware distribution gives users a chance to try software
before buying it. If you try a shareware program and continue
using it, you are expected to register. Individual programs
differ on details -- some request registration while others
require it, some specify a maximum trial period. With
registration, you get anything from the simple right to continue
using the software to an updated program with printed manual.
Copyright laws apply to both Shareware and commercial software,
and the copyright holder retains all rights, with a few specific
exceptions as stated below. Shareware authors are accomplished
programmers, just like commercial authors, and the programs are
of comparable quality. (In both cases, there are good programs
and bad ones!) The main difference is in the method of
distribution. The author specifically grants the right to copy
and distribute the software, either to all and sundry or to a
specific group. For example, some authors require written
permission before a commercial disk vendor may copy their
Shareware.
Shareware is a distribution method, not a type of software. You
should find software that suits your needs and pocketbook,
whether it's commercial or Shareware. The Shareware system makes
fitting your needs easier, because you can try before you buy.
And because the overhead is low, prices are low also. Shareware
has the ultimate money- back guarantee -- if you don't use the
product, you don't pay for it.