home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-08-21 | 137.3 KB | 3,166 lines |
- 10
- ==============================================================================
- System Manager
-
-
-
-
-
-
-
-
-
- Users File Maintenance
-
- User Info File Maintenance
-
- Analyzing Your System Configuration
-
- Defining Printer Port
-
- Defining Your Editors
-
- Customize Colors
-
- PCBoard Supported Allocations
-
- Command Line Parameters
-
-
- System Manager, as the name implies, is a utility designed to help you manage
- your system. Not only can you make global changes to the users file, but you
- can also access other frequently used utilities such as PCBSetup and
- PCBFiler.
-
-
- There are three ways that you can access System Manager:
-
- From the call waiting screen, select PCBSysMgr.
-
- While logged in locally (not with the /LOCALON switch for PCBoard), you can
- press ALT-S.
-
- From the DOS prompt you can load PCBSM.EXE. If a PCBOARD.DAT file cannot be
- found in the current directory and you have not used the /FILE command line
- parameter, you will receive an error message stating that PCBOARD.DAT could
- not be found.
-
-
- Once System Manager is loaded, you will see the Main Menu. The various
- function of system manager are available from these menu options. To select
- a particular option, press the letter at the beginning of the line, or move
- the currently highlighted option using the cursor keys and press ENTER to
- select the option. If you make a mistake, you can always use the ESC to go
- back to the previous menu.
-
- This section will describe each menu item in detail including any sub-menus.
- In addition, the command line parameters for System Manager are described in
- detailed at the end of this chapter.
-
- Users File Maintenance
-
- This is the menu option that you probably use most frequently. Once you
- select it, you will see you have an entire new menu to select from. These
- new menu options give you the ability to edit an individual user record,
- register ranges of users in conferences, sort the users file, pack the users
- file, etc.
-
- Editing A User Record
-
- When you select this menu option, you will see user record number one on your
- system.
-
- On the left hand screen is a limited number of fields that you can edit. On
- the right is a list of keyboard commands you can use to jump to another
- record, add a new user, etc. This is called the short form.
-
- User Record Forms
-
- PCBoard stores a lot of information about each user. Because all of this
- information cannot fit on one screen, PCBoard has multiple views which you
- can switch between to edit various information about each user. To switch
- between views, use the F2 and F3 keys. Pressing F2 will move forward one
- screen or form, and pressing F3 will switch to the previous form.
-
- The default view is called the Short Form. When this form is active, you can
- edit the bare essential information about each user. You can edit the
- following information when the short form is active.
-
-
- Security The normal security level that is assigned to the user.
-
- Reg Ex Date If subscription mode is active, this is the date
- which the user's subscription will expire on the
- system.
-
- Expired Sec When subscription mode is active and a user is
- expired. The expired security level will be used in
- stead of the normal security level. This field shows
- you the security level of the user when their
- subscription has expired.
-
- Delete User Mark the current user for deletion. You are asked to
- confirm your choice before the record will be marked.
- The actual record is not deleted until the next time
- you pack the users file.
-
- Comment 1 This is the response the user enters to PCBTEXT
- record #2 when creating a new account on the system.
-
- Comment 2 This comment field is for your use only. You can
- enter a brief comment about the user without having
- to worry about it being viewable by the user.
-
- The next view that is available by pressing F2 is called the Long
- Form. This is the view that you will use to edit a majority of
- the information about each user. You can edit number of bytes
- transferred, messages left, username, password, etc. The
- following describes each of the fields:
-
- Name Each person that logs into your system must use a
- user name. Most commonly this will be the name of the
- caller. This name simply identifies the caller.
-
- City The city or location information entered when creating a new
- account on the system.
-
- B/D Phone The business or data phone entered when creating a
- new account on the system.
-
- H/V Phone The home or voice phone number entered when creating
- a new account.
-
- Password Stores the password selected for logging into the
- system. Each user must know their password in order
- to log into the system. If this field is blank, the
- user will not be prompted for a password at login.
-
- Security The normal security level that is assigned to the user.
-
- Expert This field will contain a Y if the user wishes to
- default to expert mode at login. Otherwise, this
- field will show an N which means the user will
- default to novice mode.
-
- Protocol Stores the default protocol the user wishes to use
- for file transfers. This question is asked when a
- new user logs in, but it may also be changed using
- the T user command.
-
- Page Len In order to help control the display of information,
- PCBoard will use a More? prompt when the screen fills
- up on the caller's screen. In this field, the height
- of the caller's screen should be entered. For most
- users, this should be either 22 or 23. If you set
- the value in this field to 0, PCBoard will send data
- in non-stop mode. The user may change this value
- with the P user command.
-
- Reg Ex Date If subscription mode is active, this is the date
- which the user's subscription will expire on the
- system.
-
- Expired Sec If a user's subscription has expired, the expired
- security level will be assigned at login instead of
- the normal security level. This field shows the
- expired security level assigned to the user.
-
- Msg Clear This field will contain a Y if the user wishes to
- clear the screen before a new message is displayed on
- the screen. If this field contains an N, the screen
- will not be cleared between messages.
-
- Last in The conference number the user was in when
- disconnected last. If you have any conference
- defined as auto-rejoin, this field becomes of great
- importance. For example, a 3 in this field will mean
- the user logged off while in conference 3. The next
- time the user logs in, PCBoard will check to see if
- conference 3 is defined as an auto-rejoin conference.
- If so, the user will be placed back in conference 3.
-
- Delete User Mark the current user for deletion. You are asked to
- confirm your choice before the record will be marked.
- The actual record is not deleted until the next time
- you pack the users file.
-
- Comment 1 This is the response that the user entered to PCBTEXT
- record #2 when creating a new account.
-
- Comment 2 This comment field is for your use only. You can
- enter a brief comment about the user. The user will
- not be able to view the contents of this field.
-
- Last DIR ListingPCBoard keeps track of the latest valid file date
- that you have seen when viewing file directories.
- This field is used for two purposes. 1) For new
- file scans to determine what the default scan date
- should be. 2) While viewing file directories *
- (asterisks) will be placed by any files which are new
- to the caller.
-
- Last Date On Stores the last date the user logged into the system.
-
- Last Time On Stores the last time the user logged into the system.
-
- Elapsed Time On Contains the total amount of time that was spent on
- the last date the user called on the system. If the
- last date the user called is equal to the current
- date, this field contains how much time the user has
- spent for the current day.
-
- Number Times On The number of times this user has successfully logged
- into your system.
-
- Number Uploads The total number of files this user has uploaded to
- your system.
-
- Number DownloadsThe total number of files this user has downloaded
- from your system.
-
- Daily Download Contains the total number of bytes this user
- downloaded the last date on the system. If the last
- date on is equal to today's date, the value of this
- field will reflect the total number of bytes
- downloaded today. If you see a negative value in
- this field, more bytes have been uploaded than
- downloaded. In essence, the user has a byte credit.
-
- Total Upload This field displays the total number of bytes the
- user has uploaded to your system.
-
- Total Download Displays the total number of bytes the user has
- downloaded from your system.
-
- Messages Read The total number of messages the user has read.
-
- Messages Left The total number of messages the user has entered.
-
- Full Scrn EditorThis field will contain either Y, N, or A. A Y means
- the full-screen editor will always be used for
- entering messages. An N signifies that the line
- editor will be used for entering messages. Finally,
- an A means the user will be asked if they wish to use
- the full-screen editor each time they leave a
- message. The user may change this default with the W
- user command.
-
- 79-Column EditorIf this field contains a Y, both the line and
- full-screen editor will use 79 character-wide lines
- when entering messages. If an N is specified, the
- default will be 72 characters instead.
-
- Scroll Long MsgsThis field may contain either Y or N. If this field
- contains a Y, the message header will scroll off of
- the screen if the message requires more than one
- screen full to display. If this field contains an N,
- the message header will be fixed at the top of the
- screen with the message body being displayed
- underneath it.
-
- Long Headers If this field contains a Y, long message headers will
- be used. Otherwise the short message headers will be
- used. See the R user command for more information on
- the difference between long and short message
- headers.
-
- Chat Status PCBoard will remember the chat status of the caller.
- This means that if a caller has made themselves
- unavailable for group chat using the CHAT;U command,
- this field will contain a U to reflect that the user
- was unavailable. When the user logs into the system
- the next time, the chat status from their previous
- call will be reinstated.
-
-
- You can control the conference specific information for each particular user
- from the Conference View. Primarily you will register users in conferences
- from this view, but you can accomplish other tasks as well.
-
- You will notice this screen is split into two lists with 15 conferences
- listed in each list. Within each list is four columns. The first column
- displays the conference number, the next displays the name of the conference.
- The last two columns are fields you can actually edit. The first field you
- can edit is the flags field, the last column in each list keeps track of the
- last message that each user read in each conference.
-
- To move between the various fields on the screen, you can use down arrow, up
- arrow, TAB, or SHIFT-TAB. If you have more than 30 conferences, use PgUp,
- and PgDn to move forward or back 30 conferences at a time.
-
- There are five possible flags you can set for each conference. Each flag will
- specify what type of access the user has to the conference the flags are
- being set for. Each flag is described in detail below:
-
- R Register. This flag is used to control the ability of a user
- to join a conference. The main use of this flag is to
- control who will have access to private conferences you
- create. A user may not join a private conference unless they
- have an R flag in that conference. You do not need to use
- this flag for public conferences unless you want to give
- access to the conference even if the user does not have
- sufficient security to join the conference.
-
- X Expired. When used with the R flag, the user will continue
- to have access to the conference even when their subscription
- has expired. Subscription mode (PCBSetup | Subscriptions)
- must be enabled or this flag will have no effect.
-
- S Selected. Even though there may be several conferences
- defined on your system, only a few of those conferences may
- interest the user. Using the SELECT user command, users may
- select those conferences which are of interest to them.
- There are subcommands for all of the mail reading or scanning
- commands which permit users to scan either all conferences
- they can access or only those conferences selected by the
- user. For example, R;S;ALL will read new mail in all
- conferences the user can join whereas R;S;A will read mail
- only in selected conferences.
-
- C Conference SysOp. If you wish to give a user what you have
- defined as SysOp security level (PCBSetup | Security Levels |
- Sysop Commands) when the conference is joined, use this flag.
- When the user joins another conference, the security level is
- changed back to the original security level.
-
- L Locked Out. If this flag is set, the user will not be able
- to join the conference under any circumstances. When you
- specify the X flag without an R flag, the X flag will be
- translated to an L flag thereby locking the user out of the
- conference.
-
-
- The only other edit field on this screen is the last message read field. In
- this field, PCBoard keeps track of the last message the user has read in each
- conference. If you need to, you can edit the last message read in any
- conference for any user.
-
- The rest of the views are only active when you install a PSA. Each PSA has a
- separate screen which you can view information about each PSA. The following
- describes each of the PSA screens:
-
-
- If you have the Alias PSA installed, the next screen will contain the alias
- the user has selected to use. Unless you have given the user the ability to
- edit the alias choosen (PCBSetup | Configuration Options | System Control)
- the only way that the alias can be changed is while you are viewing the Alias
- Form.
-
- By installing the Full Address PSA you will enable the Address Form screen.
- From this screen, you can edit the fields that make up the user's address.
- You will notice that this screen lists the more popular components that make
- up a mailing address such as street address, city, state, etc.
-
- If you install the Password Changing PSA, the Password From will also be
- active when editing a user record. The following fields are active in this
- form:
-
- Previous Password Lists the most recently used passwords. A
- password may not be used if it is listed in
- one of these fields. Of course, each password
- will eventually be removed as it no longer
- becomes one of the three most recently used
- passwords.
-
- Last Change Date The date when the password was last changed
- by the user.
-
- # of times Changed Displays the total number of times the
- password has been changed. Multiple changes
- on the same day will not be recorded.
-
- Expiration Date The date at which the current password will
- expire. If the user changes the password
- before the expiration date, the date will be
- adjusted for the new expiration date.
-
-
- If you have installed the Verification PSA, the Verification Form will be
- active. This screen is very simple in design because there is only one field
- you cay edit. This field contains the information that the user entered as
- verification information when logging in as a new user. This information can
- be used by you as an additional piece of secret information to identify the
- caller. Considering that the caller may not view or edit this information
- once it has been entered, it should be relatively safe to assume that if the
- user knows this information that they are the original caller.
-
-
- If you have installed the Caller Statistics PSA, the Statistics Form will be
- active. This form stores various statistics about the caller. The following
- describes each field:
-
-
- First Date On This date will be equal to the date the user
- first logged into your system or the date you
- added the Caller Statistics PSA (if they
- already had an account).
-
- Last Date On The last date the user logged into your
- system. You can also see this date on the
- Long Form screen.
-
- Num Times On The total number of times this user has
- accessed your system. This information is
- also available on the Long Form screen.
-
- # Times Paged SysOp This field will record the total number of
- times this user has paged the sysop to chat.
- It does not matter if the page was answered
- or not -- all attempts are recorded.
-
- # Times Group Chat If a user uses group chat to chat with others
- on the system, the total number of chat
- sessions the user has participated will be
- recorded in this field. SysOp chats are not
- included in this total.
-
- # Comments to Sysop This field records the total number of
- comments the user has left to the SysOp using
- the C user command. If the user begins a
- comment, but aborts the message, it does not
- count as a comment to the sysop.
-
- # Messages Left For those users that are more active in the
- message base, this field will store the total
- number of messages the user has entered. You
- should be aware that while PCBoard may update
- this statistic, off-line mail reading doors
- may not.
-
- # Messages Read Displays the total number of messages the
- user has read on your system. While PCBoard
- will update this field, some off-line mail
- door programs may not.
-
- # Security Violation You can easily see who may be trying to
- access restricted functions on your system,
- by watching this field. It will total up the
- number of times a user has attempted to
- access a command which requires a higher
- security level.
-
- # Un-Reg Conf Atmpt. Records the total number of attempts made to
- join a conference which the user is not
- registered to join.
-
- # Password Failures Displays the number of times the wrong
- password was used at login. If you keep tabs
- on this statistic, you may be able to catch
- someone who is trying to hack into an account
- on your system.
-
- # Dnld Limit Reached Anytime a user exceeds their defined ratio,
- daily bytes, or total bytes / files allotted,
- the count in this field will increase by 1.
-
- # Dnld File Not Fnd. If the user attempts to download a file, but
- the filename could not be found on disk, it
- will be recorded in this field.
-
- # Upld Verify Failed After uploading a file, PCBoard will test the
- file via PCBTEST.BAT unless you have disabled
- upload testing. If the file uploaded fails
- the integrity tests, it will be recorded in
- this field.
-
- # Times On at 300 Displays the total number of times the user
- connected at 300 bps.
-
- # Times On at 1200 Displays the total number of times the user
- connected at 1200 bps.
-
- # Times On at 2400 Displays the total number of times the user
- connected at 2400 bps.
-
- # Times On at 9600 Displays the total number of times the user
- connected at 4800, 7200 or 9600 bps. All
- three speeds are shown in this field, because
- they are all only possible with 9600 bps
- modems.
-
- # Times On at 14400+ Displays the total number of times the user
- connected at 12000 bps or higher. The reason
- 12000 bps is included in this statistic is
- because it is a fall-back speed for 14400
- connections.
-
- Finally, the last PSA screen is called Caller Notes and is only active when
- the Caller Notes PSA has been installed. You are given 5 lines of 50
- characters which you may enter information to remember about the caller.
- The caller is not able to edit or view the information contained in these
- notes.
-
- Keyboard Commands
-
- While you are editing a user record, there are several keyboard commands you
- may use to perform functions such as printing the current user record,
- jumping to another record, deleting the current record, etc. The following
- details each keyboard command that is available while editing a user record.
-
-
- PgUp Move backward one user record. If you are at user record
- number one, you will go to the last record in your users
- file.
-
- PgDn Move forward one user record. If you are at the last record
- in the users file, record number one will be the new record
- you are editing.
-
- CTRL-PgUp Move backward twenty user records. When you need to move
- several records at a time, you can use this keyboard command
- which will go backwards 20 records at a time.
-
- CTRL-PgDn Move forward twenty user records. When you use this keyboard
- command you will advance 20 records at a time.
-
- ALT-A Add a user. Enables you to add a new record to your users
- file. You can then manually fill in all of the user
- information.
-
- ALT-B Jump to the last user record. Moves you to the last record
- in the users file. Since new users are added to the end of
- the users file, this keyboard command provides an easy method
- to access the records of your newest callers.
-
- ALT-D Delete current user. Marks the current user for deletion.
- You will be asked to confirm your request to delete the
- current record. If you continue, the security level will be
- reduced to 0 and the record will be marked for deletion. The
- actual record will not be deleted until you pack the users
- file. To undelete the record, simply change the answer to
- Delete User in the Long Form.
-
- ALT-E Located expired security level. Locates the first user in
- the users file who has an expired security level equal to the
- one you specify. If you want to search for other users who
- have the same security level, use the ALT-R keyboard command.
-
- ALT-F Find a user name. Enables you to search for a particular
- user record. When prompted, enter the full name of the user
- you wish to search for. If the user could not be found, you
- will be asked if you would like to perform a sound alike
- search. PCBoard will attempt to find names which sound like
- the name you typed in. If no matches can be found, you will
- be returned to the last record you were editing.
-
- ALT-J Jump to a record number. If you want to jump to a specific
- user record number, use this keyboard command. You will be
- asked for the record number you wish to jump to. You can see
- the range of users on your system by looking at the upper
- right hand side of the screen. There you will find Record #
- of #. If you enter a value that is out of range of your
- users file, your request will be ignored.
-
- ALT-L Locate a security level. When you need to search for a
- particular security level, use this keyboard command. You
- will be asked for the security level you wish to search for.
- Once you enter the security level to search for, PCBoard will
- take you to the first record in the users file that matches
- the security level. You can then use ALT-R to search for
- additional matches throughout the users file.
-
- ALT-O Locate deleted user. This keyboard command will locate the
- first record in your users file that is marked for deletion.
- This is useful when you have marked a record for deletion but
- then decide not to delete the record. Of course, if you have
- already packed the users file, there is no way to recover the
- deleted user record. As with other searches, ALT-R will find
- additional records that have been marked for deletion.
-
- ALT-P Print current user record. The current user record will be
- printed. The format of the printout is identical to the
- format displayed by the 7 SysOp command. See the SysOp
- Commands section in the PCBoard Commands chapter of this
- manual for further details.
-
- ALT-R Repeat last search. When you use a keyboard command that
- searches the users file, you can repeat the search (looking
- for additional matches) by using this keyboard command. If
- no additional matches are found, you will be returned to the
- previous user record you were editing.
-
- ALT-S Search for text. This keyboard command allows you to search
- all of the data stored in the users record (and optionally
- the PSA information) for the text you specify, excluding
- dates, times, and numerical values which are stored in a
- special format on disk.
-
- ALT-T Goto first record. Takes you to the first record in the
- users file (the SysOp record).
-
- Sorting Users
-
- If you prefer to have the users in your system sorted in a particular manner,
- select this menu option from the Main Menu of System Manager. For example,
- some SysOps prefer to have their users sorted by security level in descending
- order so users with the highest security levels are at the beginning of the
- users file. It all depends on your personal preference. One thing to
- remember is the first record in your users file will never be included in the
- sorts you perform because it is considered to be the SysOp record and has
- special privileges. You can choose to do a single or a multiple field sort.
-
- Single Field Sorts
-
- Single field sorts are most useful when you want to sort users by a field
- which does not commonly have duplicates. For example, you can sort by user
- name and since there cannot be duplicate names on your system. The screen on
- the following page shows the sorts you can perform.
-
- Once you have selected your sort method, you will be asked if you wish to
- sort in reverse order. Reverse order means that the sort will be done in
- descending order. In the case of sorting by names, those that begin with Z
- will be at the top while names that begin with A will be at the end of the
- users file.
-
-
- System Manager will now attempt to lock the users file for exclusive access
- so that it may begin sorting the users file. If you do not have all nodes
- down, you will see a sharing violation message. This message means that
- System Manager cannot gain exclusive access to the users file which it needs
- in order to resort the file. Make sure all nodes are down and no other
- programs are accessing the users file before you continue.
-
-
- Multiple Field Sorts
-
- Multiple field sorts enable you to sort by items such as security, number of
- times on the system, ratios, and more. All of these fields could easily
- contain duplicates when sorted, which presents a problem. If there are
- duplicates, how should the duplicate files be sorted (if at all)? You will
- notice that with multiple field sorts, it will first sort by the primary
- field, such as security level, and then use the user name as a secondary
- sort.
-
-
- The following screen shows the sorts you can perform:
-
-
- Once you have selected your sort method, you will be asked if you wish to
- sort the primary key in reverse order. Reverse order means that the sort
- will be done in descending order. The primary key is the main sorting
- method. For example, if you select Security Level then Name from the menu,
- the primary key is the Security Level and the secondary key is Name. You
- will also be asked if you wish to sort the secondary key in reverse order.
-
- As an example, if you select Security Level then Name from the menu and
- choose to sort the primary key in reverse order but the secondary key in the
- normal order, the following will happen:
-
-
- Your users will be sorted by security level -- those with the highest
- security level will be at the beginning of your user file.
-
- If you have more than one user with the same security level, the order that
- users are listed with the same security level will be determined
- alphabetically by the user name.
-
- Once you have selected your sort criteria, System Manager will attempt to
- lock the users file for exclusive access so it may begin sorting the users
- file. If you do not have all nodes down, you will see a sharing violation
- message. This message means that System Manager cannot gain exclusive
- access to the users file which it needs in order to resort the file. Make
- sure all nodes are down and no other programs are accessing the users file
- before you continue.
-
-
- Packing The Users File
-
- When you pack your users file, you can accomplish the following:
-
-
- Physically remove any records marked for deletion. Once a record has been
- packed out, it is permanently deleted and cannot be undeleted.
-
- Remove inactive users from your system to help conserve disk space.
-
- Make sure your USERS file is correctly in-sync with your USERS.INF.
-
-
- When you select the option to pack your users, you will see the screen on the
- following page.
-
-
- You will notice that the pack criteria screen is divided into two logical
- sections -- removal and keep criteria. You can set the criteria you want to
- remove user records from and you may also set the criteria to keep a user
- record. The keep criteria always takes precedence over the removal criteria.
-
- If you choose to accept the default values then only the following will
- happen:
-
- Any users marked for deletion will be physically removed from the system.
-
- The USERS.INF is checked to make sure it is in sync with the
- USERS file.
-
-
- Criteria For Removing Records
-
- This section of the screen gives you the ability to specify which users will
- be removed from the users file when the file is packed. There are four
- options you may specify for removing a user record:
-
- Remove Users that are Deleted or 'LOCKED OUT': When this field is set to Y ,
- any record that has a security level of 0 or has been marked for deletion
- will be deleted out of your users file. Remember, there is an option to keep
- locked out users (those with a security level of 0 but not marked for
- deletion) and the criteria for keeping a record takes precedence.
-
-
- Remove Users who have not been on for XXXX days: If you want to pack out
- inactive users on a regular basis, you will most likely use this option. If
- you enter 45 in this field, every user who does not meet the keep criteria
- will be deleted from the users file if they have not called your system
- within the last 45 days. If you do this on a regular basis, you can be sure
- only active users are stored in your users files. The default number of days
- is 9999 which disables this option.
-
- Remove Users who have not been on since: You may also choose to pack users
- out of your system by the last date they logged into the system. For
- example, you can choose to delete anyone who has not called your system since
- 01-01-93 by entering that date in this field. The default date is 01-01-80
- (the beginning of time for the PC) which disables this option.
-
-
- Remove Users whose Reg. Exp. Date is older than: If you run with
- subscription mode enabled, you may find it useful to be able to remove those
- accounts which have been expired for quite some time. The date you enter in
- this field will be compared against the expiration date in each user record.
- If the expiration date in the user record is older than the date entered, the
- user record will be removed. The default date is 00-00-00 which disables
- this option.
-
- Criteria For Keeping User Record
-
- This section of the screen gives you the ability to specify the criteria for
- keeping a user record when packing. The criteria for keeping a record takes
- precedence over removal criteria. This means that even if a user record would
- be removed, it will not be removed if it meets the criteria for keeping. The
- following two options are available:
-
- Keep Users with security greater than or equal to: Any user who has a
- security level equal to or greater than the security level specified will not
- be packed out of the user file. This is useful for making sure everyone
- above a particular security level is not packed out. For example, if you
- setup your system so everyone above security level 100 are SysOps, you may
- want to specify 100 in this field.
-
- Keep Users that are 'LOCKED OUT': A Y in this field will retain user records
- which have been marked as locked out (security level of 0 but not marked for
- deletion). As an example of why you may want to keep these records, suppose
- you have a user who has consistently violated system rules and has been
- locked out. Keeping the user record prevents this user from accessing your
- system again with the same user name and information.
-
- Performing The Pack
-
- One last option you can specify is whether you wish to print out the users
- that are deleted during the pack. If you choose to print deleted records,
- you will have a record of those users who are deleted. In each record, most
- of the user information will be printed, so you may later re-enter a user
- whom you have deleted. The information is identical to the information
- displayed by using the 7 SysOp command. See the PCBoard Commands chapter of
- this manual for further information.
-
- Once you have chosen whether or not to print the deleted records, press PgDn
- to begin the packing process. Because packing will cause a global change to
- the users file, System Manager requires exclusive access to both your USERS
- and USERS.INF files. This means no other nodes should be online. System
- Manager does, however, provide an option which allows you to pack the users
- file while users are online.
-
- The difference between packing offline and online is the fact that users who
- are currently online or were online when the process began will not be
- affected by the pack criteria you specify. When possible, it is always best
- to do a normal pack with no nodes online.
-
-
- NOTE: If you have installed the Alias PSA, System Manager will not allow you
- to perform an online pack.
-
- Print Users File
-
- Using this menu option, you can print the entire users file or only a portion
- by specifying the starting and ending user records to print. There are three
- fields that determine which records will be printed.
-
- Starting Record: The starting record number to print. The default is 1
- which will begin printing with the first record in the users file.
-
- Ending Record: The last record number you wish to print. The default is the
- last record number in your users record. The number you enter in this field
- must be larger than the number entered as the starting record or your print
- request will be aborted.
-
- Exp. users Only: Setting this option to Y means that only users in the
- specified range whose expiration date is earlier than today's date will be
- printed. Setting this option to N will print all users regardless of their
- expiration date.
-
- You may pick from three different formats for printing the users file. The
- information will be sent to the printer you defined in System Manager; all
- reports will be less than 80 characters in width and will include form feed
- codes. Each printing form is described in detail:
-
- Short Form
-
- The short form will print one user per line. On each line the following
- information will be printed:
-
-
- Name
- City/State
- Security Level
- Business / Data Phone
- Home / Voice Phone
-
- Long Form
-
- Each record printed in this style will contain the same information shown via
- the 7 SysOp command. For information on this format, refer to the PCBoard
- Commands chapter of this manual.
-
- Reg. Expiration Form
-
- Like the short form, this form will print one user per line. The information
- printed in this form is designed to help you easily locate users whose
- subscription has expired or is about to expire. The following information
- about each user is printed:
-
-
- Name
- Business / Data Phone
- Home / Voice Phone
- Security
- Expiration Date
- Expiration Info - If the user has expired then (EXPIRED) will be printed.
- If the user is within the warning period you have specified for subscriptions
- (PCBSetup | Subscription), the number of days until the user expires will be
- printed. Otherwise, this area of the report will be blank.
-
-
- Make Users File Index
-
- In general, both PCBoard and System Manager take care of the users index
- files automatically. If for some reason you suspect the indexes are out of
- sync, use this selection to recreate all user index files.
-
- When your user index files are out of sync with the users files, you may
- experience a problem when a user attempts to login, types in the correct
- password, but PCBoard will report that the password is incorrect. It does
- not hurt to recreate the index files and it does not take very long. If you
- get reports such as the one described previously, re-index your users files.
-
- Adjust Security Levels
-
- This selection brings up a sub-menu allowing you to globally adjust security
- levels in the users file according to the upload/download ratio, their number
- of uploads or even just to convert one range of security levels to a new
- security level.
-
- You can also initialize globally all upload/download counters and change
- security levels a user's real security level to equal the expired security
- level.
-
- The screen on the following page displays the security level adjustments you
- can perform.
-
-
- Adjust by Ranges
-
- Use this menu option to assign a new security level to a group of users
- within a specified security level range.
-
-
- For example, if you need to change every user with a security level of 35 to
- a security level of 33, enter the following:
-
-
- Change users whose security is greater than or equal to : 35
- and whose security level is less than or equal to : 35
-
- To a new security level of : 33
-
- You may need to consolidate a range of security levels into one single
- security level. This can be done with the menu option very easily. To
- change every user with a security level between 20 and 29 to security level
- 20, enter the following:
-
-
- Change users whose security is greater than or equal to : 20
- and whose security level is less than or equal to : 29
-
- To a new security level of : 20
-
-
- Adjust by Ranges (Expired)
-
- This menu option is identical to Adjust by Ranges with one major exception:
- Instead of modifying the actual security level of the user, only the expired
- security level is modified.
-
- As an example, if you need to change every user who has an expired security
- level of 45 to reflect a new expired security level of 55, enter the
- following:
-
-
- Change users whose security is greater than or equal to : 45
- and whose security level is less than or equal to : 45
-
- To a new security level of : 55
-
- You may need to consolidate a range of expired security levels into one
- single expired security level. To change every user with an expired security
- level between 30 and 49 to an expired security level of 25, enter the
- following:
-
-
- Change users whose security is greater than or equal to : 30
- and whose security level is less than or equal to : 49
-
- To a new security level of : 25
-
-
- Adjust by Up/Dn File Ratio
-
- This menu option gives you the ability to globally adjust security levels of
- users according to file ratio of each user.
-
- System Manager will refer to the file ratio table you create to determine
- what security level is assigned based on the user's ratio. See Create Up/Dn
- File Ratio Table for information about creating the table.
-
- Before you begin, you are asked if you wish to print the users who have their
- security level changed. If you choose to print the report, it will be sent
- to the printer defined in System Manager. The report includes:
-
-
- User name
- Number of files uploaded
- Number of files downloaded
- File ratio
- Old security level
- New security level
-
-
- Adjust by Up/Dn Byte Ratio
-
- This menu option gives you the ability to globally adjust security levels of
- users according to the byte ratio of each user.
-
- System Manager will refer to the byte ratio table you create to determine
- what security level is assigned based on the user's ratio. See Create Up/Dn
- Byte Ratio Table for information about creating the table.
-
- Before you begin, you are asked if you wish to print the users who have their
- security level changed. If you choose to print the report, it will be sent
- to the printer defined in System Manager. The report includes:
-
- User name
- Number of bytes uploads
- Number of bytes downloads
- Byte ratio
- Old security level
- New security level
-
- Adjust by Number of Uploads
-
- You may also adjust the security level of users based on the number of files
- they have uploaded to the system. System Manager will reference the table
- created via Create Upload Table.
-
- Before you begin, you are asked if you wish to print the users who have their
- security level changed. If you choose to print the report, it will be sent
- to the printer defined in System Manager. The report includes:
-
-
- User name
- Number of uploads
- Old security level
- New security level
-
-
- Adjust by Number of Downloads
-
- You may also adjust the security level of users based on the number of files
- they have downloaded from the system. System Manager will reference the
- table created via Create Download Table.
-
- Before you begin, you are asked if you wish to print the users who have their
- security level changed. If you choose to print that report, it will be sent
- to the printer defined in System Manager. The report includes:
-
-
- User name
- Number of downloads
- Old security level
- New security level
-
-
- Create Up/Dn File Ratio Table
-
- This menu option is the one you want to use to create the table used for
- adjusting security levels by the file ratio of a user.
-
- When you select this menu option, you will see the screen on the following
- page.
-
-
- Notice that there are two columns where you edit data. One column is titled
- Ratio and other is titled Security. Based on the file ratio of the user, a
- new security level will be assigned.
-
-
- When designing your table, keep in mind how System Manager will read the
- table. It reads two ratio entries at a time. If a user falls in-between the
- two ratios, the user will get the security level listed to the right of the
- first ratio. The following illustrates:
-
- System Manager will continue to search through the table until a match is
- found. Notice that the key is the ratio. The user will be assigned a
- security level based on their ratio. If you are looking to assign a ratio to
- a particular security level, define the ratio in the PWRD file (PCBSetup |
- File Locations | Configuration Files).
-
- Normally a ratio is specified as something like 10:1 (10 to 1). Entering a
- ratio in that manner is cumbersome so an alternate method had to be devised.
- System Manager determines a ratio less than 0 to be a download to upload,
- while a positive ratio number is considered an upload to download ratio.
-
- What is the difference? A download to upload ratio means more has been
- downloaded than uploaded, while an upload to download ratio means more has
- been uploaded than downloaded.
-
- Rather than limiting you to whole number ratios only (e.g., 25:1) you may
- enter up to the tenths digits (e.g., 25.3:1). To specify a ratio of 25.3,
- enter either 253 to specify an upload to download ratio or -253 to specify a
- download to upload ratio. Remember that 25 is really 25.0 so you must enter
- it as 250 or -250. If you enter 25, it will be interpreted as 2.5.
-
- The following are some important items you will want to remember about
- creating your ratio table:
-
- The ratios you enter should be ordered from smallest to greatest. This means
- you should enter the negative ratio values at the top of your list and your
- positive values at the end of the list. Your ratio table will automatically
- be sorted before it is saved to disk.
-
- The ratio you enter for the first entry is ignored because it represents the
- absolute largest download:upload ratio. The security level for the first
- entry is important though, because it is the security level that used when
- System Manager compares the first two entries in your table.
-
- The security level to the right of your last entry in the ratio table will
- only be assigned if the user has a better ratio than the ratio defined on the
- last line. This means that if your last line is set for a ratio of 50 and a
- security level of 40, the user will only get a security level of 40 if they
- have a ratio that is better than 5 uploads for every download.
-
- A ratio of 0, 10, or -10 implies that uploads are equal to downloads.
-
- Only security levels listed in the security column will be included in ratio
- checking. This means you can have users that are exempt from being adjusted
- due to their ratio by simply excluding their security in your ratio table
- definition.
-
- As an example, let's assume you want to create a simple ratio table where if
- a user has a download:upload ratio greater than 20:1, a security level of 20
- will be assigned. In addition, a ratio between 10:1 and 20:1 will result in
- a security level of 30, and a ratio above 10:1 will get a security level of
- 40. To accomplish this, create the following table:
-
- Ratio Security
- ---------- --------
- -9999999 20
- -200 30
- -100 40
- 0 0
-
-
- If you want to set up another ratio, it is very easy to add. Let's say you
- want to give users that have uploaded more than they have downloaded a
- security level of 50. This can be done simply by adding a new line after the
- -100 line making your table resemble the following:
-
-
- Ratio Security
- ---------- --------
- -9999999 20
- -200 30
- -100 40
- 0 50
- 0 0
-
- So you can get a feeling of how System Manager will use your table to assign
- security levels, let's look at three sample users and see how their security
- levels will be adjusted.
-
- Security : 20
- Number Uploads : 8
- Number Downloads : 523
-
- Calculation of this user's ratio reveals it to be about 65.4 downloads for
- every upload, which is expressed in System Manager as -654. System Manager
- will look at the first two lines in your ratio table:
-
-
- -9999999 20
- -200 30
-
- As you can see, this particular user has a ratio in-between these two lines
- so a security level of 20 will be assigned (which the user already has). The
- next user has the following record:
-
- Security : 30
- Number Uploads : 353
- Number Downloads : 751
-
-
- This particular user has a ratio that equates to approximately 2.1 downloads
- for every file uploaded. In System Manager terms this is expressed as -21.
- System Manager will now analyze your ratio table from the top, down to the
- bottom looking for a match:
-
-
- -9999999 20
- -200 30
-
-
- The ratio for this user does not fit between this range so the
- next two lines are analyzed.
-
- -200 30
- -100 40
-
-
- This user's ratio does not fit between this range either, so the
- next two lines are analyzed.
-
- -100 40
- 0 50
-
- Finally, a match. This user's ratio was -51, which falls within this range.
- Now looking at the security level of the first line, we can see the user will
- receive a security level of 40. This particular user was upgraded from a
- security level of 30 to a new security level of 40 because of the improved
- file ratio.
-
-
- The last user has the following information:
-
-
- Security : 35
- Number Uploads : 7
- Number Downloads : 43
-
-
- This user will not be affected, not because the ratio would leave him at
- security level 35, but rather because security level 35 is not even listed in
- the ratio table. As stated earlier, security levels not listed in the table
- will not be adjusted due to their ratios.
-
- Create Up/Dn Byte Ratio Table
-
- The only difference between this option and adjusting by file ratio is that
- System Manager will determine the ratio based on bytes uploaded and
- downloaded instead of the number of files transferred. Everything else about
- byte and file ratios are the same including creating the ratio table. For
- more information on creating the table, see the previous section.
-
- Create Upload Table
-
- This option gives you the ability to adjust the security level of a user
- based on how many files they have uploaded to the system. When you select
- this option, you will notice that it looks quite similar to ratio tables.
-
- This table does not try to relate uploads and downloads to one another so you
- may find it easier to setup. System Manager will simply analyze two lines of
- your table at a time. If the number of files a user has uploaded falls
- between two entries, the user will be given the appropriate security level as
- shown in the following sample:
-
- As an example, let's assume you creat the following table:
-
-
- Uploads Security
- ---------- --------
- 0 15
- 1 20
- 50 40
- 0 0
-
- Until a user uploads a file, the security level will remain 15. A user who
- has uploaded more than one file, but has not yet uploaded 50 files, will
- receive a security level of 20. If a user has uploaded 50 or more files, a
- security level of 40 will be given.
-
- Create Download Table
-
- The creation and use of this table is identical to the Upload table. The
- only exception is that the number of files downloaded are checked instead of
- the number of files uploaded. Refer to the previous section for additional
- information.
-
- Change Security to Expired Level
-
- When a user's subscription expires, PCBoard leaves the security level intact
- but will give the user their expired security level at login. By doing this,
- a user can renew their subscription and you simply have to update their
- expiration date to restore the old security level.
-
- Sometimes, however, you may want to make permanent the expired security level
- of a user whose subscription has expired. This menu option allows you to
- make this change, adjusting the user's normal security level to match the
- level in the expired security level field.
-
- Before you make this change, PCBoard asks if you wish to print a list of
- users who have their security levels changed. Answering Y at this prompt
- will cause a report to be printed to the printer defined for System Manager
- to use. This report includes the following information:
-
-
- User name
- Old security level
- New permanent security level (expired security level)
- Date of expiration
-
- Before System Manager makes the change, it must verify it is the only
- application accessing the users file. If it cannot gain exclusive access to
- the users file, you will receive notice that all nodes must be down before
- you can make this change.
-
- Initialize Upld/Dnld Counters
-
- You can use this option to reset or change the upload/download byte and file
- counters for every user on the system. You can choose any of the following
- options:
-
-
- Make the upload counter equal to the download counter.
- Make the download counter equal to the upload counter.
- Set both the upload and download counters to 0.
-
-
- Initialize upload and download BYTE counters to be equal to the current
- users file ratio. If you select this option you are given the option to
- specify a number to multiply the number of files transferred to store in the
- bytes transferred fields. For example, if a user has uploaded 3 files and
- downloaded 10 files and you specify a multiplier of 100, the user's byte
- counters will show 300 bytes uploaded and 1000 bytes downloaded. The
- multiplier is simply for cosmetic purposes. Also, you should be aware that
- if you select this option, your answers to the Adjust Upload / Download
- FILE/BYTE Counters questions will be ignored.
-
- There are two other questions on this screen. Your answer to these questions
- determine which counters will be set.
-
- Adjust Upload / Download FILE Counters
- Adjust Upload / Download BYTE Counters
-
-
- For example, if you select option number 3, and you set Adjust Upload /
- Download FILE Counters to Y, the following field will be set to 0 in each
- user's record:
-
-
- Number Uploads
- Number Downloads
-
-
- Of course, if you answer Y to both questions, both of the following fields
- will be reset to 0 for all users:
-
-
- Number Uploads
- Number Downloads
- Total Upload
- Total Download
- Registering Users In A Conference By Security Level
-
-
- When you need to modify the conference registrations of a large number of
- users, you certainly would not want to do so manually. System Manager gives
- you the ability to modify a range of conference flags for users within a
- particular security range.
-
- Selecting Conferences To Modify
-
- The following fields allow you to control the users who will have their
- conference flags modified:
-
-
- First number of conferences to be inserted in registrations
- Last number of conferences to be inserted in registrations
-
- Enter the beginning conference number to be modified in the first field, and
- in the second field, enter the last conference number to be included in the
- list of conference registrations to be modified. For example, if you want to
- modify the conference registrations for conferences 3 through 10, enter the
- following:
-
-
- First number of conferences to be inserted in registrations : 3
- Last number of conferences to be inserted in registrations : 10
-
-
- If you need to modify just one conference, enter the conference number as
- both the first and last conference to modify.
-
- Setting Conference Flags
-
- Once you have selected the conferences to modify, you must determine how you
- will be altering the access to the conference. The following five fields
- control what access you can give to a conference:
-
-
- Adjust conferences user is normally allowed to join
- Adjust conferences user can join with expired subscription
- Adjust the user selected conferences for scanning
- Adjust conferences where user becomes a sysop when joining
- Reset user's last message read to zero in these conferences
-
- The first four questions are simply the conference flags you may set (R, X,
- S, and C). For additional information on conference flags, see Editing a
- User Record in the Users File Maintenance section of this chapter. If you
- wish to reset the last message read pointer for each conference you modify,
- answer Y to the Reset user's last message read to zero in these conferences
- question.
-
- Selecting User Records To Modify
-
- The last thing you must determine is the range of users who will have their
- conference registration information changed. Simply state the lowest
- security level you wish to modify and then the highest security level to
- modify. Every user with a security level between the two levels you enter
- will have their conference information modified.
-
- Making The Change
-
- When you have finished entering the security levels, conference numbers and
- the conference flags you wish to modify, press PgDn to begin the process.
-
- Before System Manager actually begins modifying the user file, it will
- attempt to make sure it has exclusive access to both the USERS and USERS.INF
- files. If it cannot get exclusive access to these files, it will not be able
- to modify the records for each user. Make sure all nodes are down before you
- attempt to make a global change such as inserting group conference
- registrations.
-
- Examples
-
- Let's assume you just created conference #3 on your system which displays
- community event information. If you want to have that conference selected
- for reading by every user on your system, enter the following into each
- field:
-
- As another example, suppose you want to create conference #53 to be a private
- conference for those with a security level of 90 or higher. Since an R flag
- is required to be able to join a private conference, you might go about
- setting the flag manually in all user accounts with a security level of 90 or
- higher -- this would be quite an undertaking on a system with a large user
- base. Instead, you can let System Manager do all of the hard work for you by
- entering the following information:
-
- Removing Access To A Conference By Security Level
-
- When you need to modify the conference registrations for a large number of
- users, you certainly do not want to do it manually. System Manager gives you
- the ability to modify a range of conference flags for users within a
- particular security range.
-
- Selecting Conferences To Modify
-
- The following fields allow you to control the users that will have their
- conference flags modified:
-
-
- First number of conferences to be inserted in registrations
- Last number of conferences to be inserted in registrations
-
-
- Enter the beginning conference number to be modified in the first field, and
- in the second field, enter the last conference number to be included in the
- list of conference registrations to be modified. For example, if you wanted
- to modify the conference registrations for conferences 3 through 10, enter
- the following:
-
-
- First number of conferences to be inserted in registrations : 3
- Last number of conferences to be inserted in registrations : 10
-
-
- If you need to modify just one conference, enter the conference number as
- both the first and last conference to modify.
-
- Deselecting Conference Flags
-
- Once you have selected the conferences to modify, you must determine how you
- will be altering access to the conference. The following five fields control
- what access you can remove from a conference:
-
-
- Adjust conferences user is normally allowed to join
- Adjust conferences user can join with expired subscription
- Adjust the user selected conferences for scanning
- Adjust conferences where user becomes a sysop when joining
- Reset user's last message read to zero in these conferences
-
-
- The first four questions are simply the conference flags that you may set (R,
- X, S, and C). For additional information on conference flags, see Editing a
- User Record in the Users File Maintenance section of this chapter. If you
- wish to reset the last message read pointer for each conference you modify,
- answer Y to the Reset user's last message read to zero in these conferences
- question.
-
- Selecting User Records To Modify
-
- The last thing you must determine is the range of users who will have their
- conference registration information changed. Simply state the lowest
- security level you wish to modify and then the highest security level to
- modify. Every user with a security level between the two levels you enter
- will have their conference information modified.
-
- Making The Change
-
- When you have finished entering the security levels, conference numbers and
- the conference flags you wish to modify, press PgDn to begin the process.
-
- Before System Manager actually begins modifying the user file, it will
- attempt to make sure it has exclusive access to both the USERS and USERS.INF
- files. If it cannot get exclusive access to these files, it will not be able
- to modify the records for each user. Make sure that all nodes are down
- before you attempt to make a global change such as inserting group conference
- registrations.
-
- Examples
-
- If you have 50 conferences on your system (conferences 0-49) and you want to
- make sure no users have conference SysOp status (the C flag), you can enter
- the following information:
-
- Another example may be when you want to remove everyone with a security level
- less than 50 from conference #9 which is a private conference. For this task
- you may want to remove all of their conference flags and reset their last
- message read to 0 as well.
-
-
- Moving Access From One Conference To Another
-
- From this menu option, you can move the access of users from one conference
- to another conference. Not only can you move the conference flags from one
- conference to another, but you can also move the last message read to the new
- conference.
-
- Specifying Conferences
-
- In the REMOVE user(s) from which conference field, enter the conference
- number you wish to remove the conference access from. In the ADD to which
- conference field enter the conference number that you will be moving
- conference access to.
-
- Moving Conference Information
-
- The following lists which questions control the conference flags. For a
- detailed description of conference flags see Editing a User Record in the
- Users File Maintenance section of this chapter.
-
-
- R Adjust conferences user is allowed in (all times)
- X Adjust conferences user is allowed in (expired)
- S Adjust conference user-scan preference list
-
- System Manager moves each conference flag field to the new conference exactly
- as set in the original conference. It is recommended that you either leave
- all three of these questions set to Y or set to N.
-
- The next question you are asked gives you the ability to modify the user
- record so it shows the Last Conference In field to reflect the new
- conference. Of course, this will not be of much use unless the new
- conference is defined as an auto-rejoin conference. If the new conference is
- defined as an auto-rejoin conference, affected users will be logged into this
- conference the next time they log in.
-
- The last question asks if you wish to also move the last message number read
- from the old conference to the new conference. If you answer Y in this
- field, the last message read number will be moved to the new conference, and
- the old conference will have the last message read set to 0.
-
- Selecting Security Levels
-
- As with other functions in System Manager, you determine what users will have
- their records modified by a range of security levels. Simply enter the
- lowest and highest security level for the records you wish to modify. Every
- record in the indicated security level range will be affected by the change.
-
- Example
-
- The following illustrates what to do if you want to move the conference
- information from conference 2 to conference 3 for users with a security level
- of 50.
-
- First, while editing a user record for which you will be moving conference
- information, look at the conference form in System Manager. You should see
- something similar to the following:
-
- Num Conference Flags Last Msg
- ----- ------------- ----- --------
- 0 Main Board : RXS : 51371
- 1 OpSys : : 0
- 2 Admin : RXS : 120022
- 3 Chatter : RX : 0
-
- Next, enter the following after selecting Move Users BETWEEN Conferences from
- the Users File Maintenance menu:
-
- Finally, press PgDn to begin moving the conference information. System
- Manager is going to require exclusive access to USERS and USERS.INF, so make
- sure no other nodes are online before you press PgDn. Otherwise, you will
- receive an error message and System Manager will continually try to access
- the file that until you press E to abort the process or the file is no longer
- in use.
-
- Once the change has been made, you will see user records have been updated.
- Looking at the same record we reviewed before we made the change, you will
- now see:
-
- Num Conference Flags Last Msg
- ----- ------------- ----- --------
- 0 Main Board : RXS : 51371
- 1 OpSys : : 0
- 2 Admin : : 0
- 3 Chatter : RXS : 120022
-
- Notice that all of the conference information from conference 2 has been
- moved over to conference 3.
-
- Adjusting Expiration Dates
-
- When you need to upgrade the expiration date of several users, you can let
- System Manager's Change Expiration Date menu option do the work for you.
- Using this menu option you can update the expiration date of users on your
- system to a new date or add additional days to their expiration date.
-
- Security Level Criteria
-
- In order to modify the expiration date of users on your system, you need to
- specify a range of security levels that you wish to modify. First however,
- you must select if you wish the security level range to be based on the
- normal or expired security level of each user. The following are valid
- options for this field:
-
- E Expired security level. Base the range of security levels
- that will be affected on the expired security level of each
- user instead of the normal security level.
-
- N Normal security level. Base the range of security levels
- that will be affected on the normal security level of each
- user.
-
-
- Specifying Security Range
-
- Using the following field, you can specify the range of security levels
- (normal or expired) you wish to modify.
-
-
- Adjust Expiration Date if level is Greater than or equal to
- Adjust Expiration Date if level is Less than or equal to
-
-
- For example, if you want to modify the range of security levels between 20
- and 30, enter a 20 in the first field and a 30 in the second field.
-
- Setting New Expiration Date
-
- You can choose to either set an actual date to change all records to or you
- may choose to simply add a certain amount of days to the expiration date of
- the user. If you wish to make the new expiration date uniform throughout the
- range selected, specify the date at the following prompt:
-
-
- New Expiration Date (01/01/80 is ignored)
-
-
- If you leave the date in that field as 01-01-80, System Manager assumes you
- want to extend their current expiration date by the amount of days specified
- in the follwoing field:
-
-
- Current Date in record plus XXXX days
-
-
- Printing Changed Records
-
- The final question on this screen asks if you wish to print a report of users
- who have their user records changed. If you answer Y to this question, a
- report will be printed to the printer you have defined in System Manager.
- This report will contain:
-
-
- User name
- Security level
- Old expiration date
- New expiration date
-
-
- Making The Change
-
- When you have filled in all of the fields, press PgDn to begin changing the
- records. If System Manager can gain exclusive access to the users file, it
- will begin modifying the records you have specified. If System Manager
- cannot guarantee it has exclusive access, it will print a message that states
- LOCK FAILED. In order to gain exclusive access to the users file, make sure
- you do not have any nodes up and running or ready to take calls.
-
- Example
-
- To help illustrate the advantage of being able to globally change expiration
- dates, let's use the following example:
-
- You accept subscriptions to your system where your users will pay money for
- one year of access.
-
- Your subscribers occupy security levels 60-80.
-
- Keeping all of this in mind, let's assume you had system troubles that caused
- you to be down for two days in a row. To help relations with what may be
- several angry subscribers, you decide to extend all subscription by an
- additional week (7 days). Rather than manually modify each record you can
- use System Manager's Change Expiration Date menu option. Fill in the fields
- on the screen as follows:
-
-
- Security Level Range
- --------------------
- Base Security Level Criteria on NORMAL or EXPIRED Level (N/E) : N
- Adjust Expiration Date if level is Greater than or equal to : 60
- Adjust Expiration Date if level is Less than or equal to : 80
-
-
- Change Expiration Date To:
- --------------------------
- New Expiration Date (01/01/80 is ignored) : 01-01-80
- Current Date in record plus XXXX days : 7
-
- Print Changed User Records on the Printer : N
-
-
- Standardizing Phone Formats
-
- Selecting this menu option will standardize the phone fields for every user
- on your system. Essentially, this option merely strips all non-numerical
- information from the phone field and attempts to fit the phone number into
- the following format:
-
-
- 999 999-9999
-
-
- If the phone number is shorter than 10 digits, 1t will start building the
- phone number from the right. Therefore, if one of the phone numbers in the
- user record was 323-835, System Manager will convert this phone number to
- 32-3835. Once all of your phone numbers are standardized, you can reliably
- sort the users file by the contents of this field.
-
- Undo Previous Change
-
- Selecting this menu option will enable you to undo any global changes you
- have made to the users file while in System Manager. The following lists all
- of the global changes you can make in System Manager:
-
- Sort Users File
- Pack Users File
- Pack Users File while Online
- Adjust Security Level by Ranges
- Adjust Expired Security Level by Ranges
- Adjust Up/Dn File Ratio
- Adjust Up/Dn Byte Ratio
- Change Security to Expired Level
- Initialize Upld/Dnld Counters
- Insert Group Conference
- Remove Group Conference
- Adjust Expiration Dates
- Standardize Phone Formats
-
- When you select the undo option, you will be asked to confirm that you really
- wish to undo your most recent global change. If you select to undo your
- changes, System Manger will restore the last backup of the USERS and
- USERS.INF file and then re-index your users file to make sure the index files
- are current.
-
- User Info File Maintenance
-
- User Info File Maintenance refers to maintaining your USERS.INF file.
- Because the USERS.INF file is so flexible there are a lot of functions you
- can use, although not nearly so many as with the USERS file alone.
- Everything you will need to do with the USERS.INF file will be controlled
- from the menu that will appear after you select User Info File Maintenance
- from the System Manager Main Menu.
-
- Change Conference Allocations
-
- The size of the USERS.INF file is dynamic. This means it can grow or shrink
- based on the components installed inside of the file. For example, PCBoard
- stores the last message read pointers in this file. As you would expect, the
- more conferences that you have, the bigger the file will be because you have
- more last message read pointers to store.
-
- To make sure your USERS.INF file is properly configured for the number of
- conferences you have installed on your system, select this menu option. If
- you see an error message that says Need to update User Info File Conference
- Allocations, you need to select this menu option to properly insure that your
- USERS.INF file is properly sized. If you receive this previously mentioned
- error message, you will need to load System Manager from the DOS prompt
- because you will not be able to access it from the call-waiting screen.
- Simply change to your PCBoard subdirectory and execute PCBSM.EXE.
-
- When you select this menu option you will see a status report about your
- USERS.INF file. Each section is detailed in the following sections.
-
-
- Total Conference Areas
-
- This lists the total number of conferences you have defined for your system.
- PCBoard determines this number by reading the PCBOARD.DAT that System Manager
- reads when it loaded and looking at what is set for the Number of Highest
- Conference Desired in PCBSetup | Configuration Options | Messages. System
- Manager then adds one to this number to account for the Main Board.
-
- For this reason, it becomes important that if you increase the maximum number
- of conferences desired, you should also update every PCBOARD.DAT you use on
- your system. Otherwise, you can find yourself repeatedly updating conference
- allocations because you have a different amount of conferences available
- depending on which PCBOARD.DAT is read.
-
- Number of EXTENDED Conferences
-
- This field will report how many extended conferences you have (or 0 for
- none). Any conferences above the first 40 are considered to be extended
- conferences. This is simply a name reference and does not signify a
- difference between conferences. The name reference is used because earlier
- versions of PCBoard supported 40 conferences which has long since been
- surpassed.
-
- Total static user allocation
-
- This field will tell you how many static bytes will be allocated for each
- record. Static allocations are not dependent on the number of conferences.
-
- Total dynamic allocations
-
- Dynamic allocations are dependent on the number of conferences you have
- allocated on your system. As the number of conferences on your system
- increases, so will the dynamic allocations on your system.
-
- Updating USERS.INF Conference Allocations
-
- After the report of allocations and total conferences on your system, you
- will see one of the following messages:
-
- None of the above allocations require upgrading at this time...
-
- WARNING: One or more of the above allocations requires updating
-
- If you see the former message, you do not have to worry about updating your
- conference allocations. However, if you see the latter message, you must
- update your conference allocations or you will not be able to load PCBoard.
-
- List Installed PSA/TPA Areas
-
- This menu function will list all of the third party allocation (TPA) and
- PCBoard support allocation (PSA) areas that are currently installed. TPAs
- are areas in your USERS.INF file reserved for specific third party
- applications. PSAs are specific features you can add such as full address
- support, alias support, etc.
-
- When you choose this menu option, you will see a list of all TPA and PSA
- areas that are installed on your system.
-
- If you have not installed any TPAs or PSAs, you will be notified that you do
- not have any installed. If you do have one or more installed, System Manager
- will display information about each one.
-
- The first piece of information will display if the allocation is a PSA or a
- TPA followed by the name of the allocation. Even though you may not need to
- know any additional information, you will also be shown the version number
- and the total static/dynamic space allocated for each user. For TPAs,
- System Manager will also show you the Key information which is used by each
- third party program.
-
- Add PCBoard Supported Allocations
-
- From this menu option, you can install a PCBoard Supported Allocations (PSA).
- These give you the ability add functionality to your system such as alias or
- full-address support. For more information on adding a PSA please see the
- Adding a PSA section in this chapter.
-
- Remove PSA From User Info File
-
- Simply select the PSA you wish to remove from your system. Before System
- Manager removes the PSA it will ask to confirm that you really wish to delete
- it. For additional information, please see the Removing A PSA section in
- this chapter.
-
- Add/Update Third Party Application
-
- A TPA gives a third party application the ability to have PCBoard reserve
- space in the USERS.INF file for its use. Most applications will use this
- reserved area or allocation to store information about each user. Using this
- method, an application does not have to create a separate data file to store
- redundant user information, nor does it have to worry about maintaining this
- file of active user data. The TPA is actually part of the USERS.INF file, so
- when a user is deleted from your system, all TPA information for that user is
- deleted too.
-
- Normally, you will only install a TPA if the application you are installing
- explicitly tells you to setup a TPA in System Manager.
-
- When you choose to add a TPA, you will be asked to enter the TPA name. Enter
- the name in this field as specified by the author of the application. If you
- do not, the application may error upon loading because the wrong name was
- entered in this field.
-
- If you enter the name of a TPA which already exists, the existing information
- will be displayed and you can edit the fields as your needs dictate.
-
- Once you have entered a new application name, you will be asked to specify
- the version number, static allocation, dynamic allocation, and a keyword.
- The author of the application should provide the values you should enter for
- everything except keyword.
-
- Version: Just as most programs have a version number, a TPA can have a
- version number as well. The application which uses this TPA may use this
- version number to verify it is indeed reading proper data.
-
- Static Size: There are two size types in a TPA. Static size never changes
- -- it is a fixed size. You need to enter the value the author of the
- application specifies. If you enter a value which is too high or too low,
- chances are the application will error upon loading or behave unpredictably.
-
- Dynamic Size: Enter the value the author of the application specifies for
- this field. This determines how many bytes will be reserved for each
- conference. Consequently, the more conferences you have defined in your
- system, the more space this will end up taking on your hard drive.
-
- Keyword: In this field, enter the door name that will use this TPA. This
- information can be obtained from the filename field in your DOORS.LST file.
- If you do not specify a valid door name, the information in the TPA will not
- be available to the application requesting the information.
-
- Remove TPA From User Info File
-
- To remove a TPA, you must know the name. If you do not know the name, you
- can use the List Installed PSA/TPA Areas menu option for a list of installed
- allocations. When you enter the name of the TPA that you wish to remove,
- System Manager will check to see if it exists. If it does, you will be asked
- to confirm that you wish to remove the TPA. If you choose to remove it, all
- data stored in the TPA will be lost as it is removed from the USERS.INF file.
-
- Create User Info File
-
- Normally you will not need to create your USERS.INF file because PCBoard will
- take care of that for you. However, if you lose the file or if it becomes
- corrupt beyond repair, you may elect to recreate the file.
-
- If System Manager detects a USERS.INF file when you attempt to re-create it,
- you will be warned that it already exists and will be asked to confirm that
- you want to recreate the file. Recreating the file will cause all TPA
- information to be lost as well as the loss of some conference information for
- all conferences numbered 40 and above.
-
- Analyzing Your System Configuration
-
- This menu option will load PCBDiag which you can use to help analyze your
- system configuration. When you select this menu item, you will be preseneted
- with a list of items that you can analyze. To do a full analysis, make sure
- you enter a Y in all of the fields.
-
- Once you determine what you want to analyze, press PgDn to begin. You will be
- asked where the report should be printed. In the field, you can enter any
- printer port or filename. Specifying a printer port such as LPT1 will send
- the report to the printer attached to LPT1 while entering a filename will
- print the report to the file you specify.
-
- When you are working with the technical support staff to resolve a problem
- with your system, you may be asked to print or output your analysis to a
- file. In this situation you should always print the report to a file and
- upload the file to Salt Air. The technician assisting you will review the
- file and continue working with you on the problem.
-
- Defining Printer Port
-
- There are several places in System Manager that allow you to print out
- reports or results of a particular action. System Manager will use the
- printer that you define using this menu option.
-
- The first thing you will notice about the printer definition is that you can
- enter more than a simple port number. You can enter any filename or device.
- If your printer is on LPT1, enter LPT1 in this field. If, instead, you wish
- to send all printer output to a text file, you can do so by specifying a
- filename to send the output to.
-
- The following are sample printer definitions:
-
-
- LPT1
- LPT2
- C:\PCB\PRINTER.OUT
- F:\PRN\PCBOARD.PRN
- COM1
- COM2
-
-
- Defining Your Editors
-
- When you are configuring your system in PCBSetup, there are several places
- where you need to load an editor to edit a batch file or a display screen.
- This menu option allows you to specify the editors you want to have available
- while in PCBSetup. There are two editors you may specify -- text and
- graphics.
-
- Text Editor
-
- Throughout PCBSetup you will notice that you can press F2 in several places
- to edit a particular file. If the file you are editing is a display file or
- a batch file, PCBSetup will use the editor you define in this field to edit
- the file.
-
- By default, the editor selected here will be PCBEdit, which is a
- text/graphics editor which ships with PCBoard. If you have a favorite text
- editor, you may specify that program name instead. However, if you opt to
- change the editor, you will want to pick a small ASCII text editor rather
- than a word processing type program because of the memory constraints
- involved, and because the file must be saved in DOS text format.
-
- When PCBSetup calls your editor, it will run the program and pass the
- filename to edit as the first and only parameter. Therefore, the editor you
- install must be capable of accepting the filename to edit on the command
- line.
-
- Graphics Editor
-
- When a display file is highlighted in PCBSetup, you can use F2 to edit the
- normal display file, or F3 to edit the graphics specific version of the same
- file.
-
- When you press F3, System Manager will use the editor you have defined as
- your graphics editor to edit the graphics specific version of the display
- file. This is most useful when you need to create a plain ASCII file for
- your non-graphic callers but then choose to make a graphics specific file
- with animation or similar effects.
-
- You will want to use a graphics editor that will support either ANSI or
- PCBoard @X codes. Included with your PCBoard package you will find
- PCBEDIT.EXE. PCBEdit will create ASCII text files and it has the ability to
- create colorized display screens using PCBoard @X color codes.
-
- The graphics editor is called in the same manner as the text editor. The
- filename to edit will be passed on the command line so you need to use a
- graphics editor program that is capable of accepting the filename on the
- command line.
-
- Customize Colors
-
- Everyone has their own likes and dislikes -- color is no exception. Using
- this menu option you can customize the colors that are used for the PCBoard
- utilities (PCBSetup, System Manager, etc.)
-
- Using Predefined Defaults
-
- System Manager provides you with several default color schemes you can use
- by simply selecting the menu options on your screen. The first color set is
- the default color set when you first receive PCBoard. If you do not like any
- of the default color sets you may customize the colors manually using the
- Customize Colors menu option.
-
- Customizing Your Own Colors
-
- Upon selecting the Customize Colors menu option you will see the following
- screen (once you have read the instructions and pressed R):
-
-
- This screen contains several objects. You will notice part of a help window,
- a menu listing, questions, and many other fields and borders. The
- instructions for colorizing this screen to your own tastes are very simple:
-
- Move the cursor (using the up, down, left, and right arrow keys) until the
- cursor is on top of the item or object you wish to modify, and press ENTER.
-
- From the color box that pops up, use the cursor keys to select the color you
- wish to use for the currently selected item. It is important to remember
- that each color selection contains a background and a foreground color. The
- foreground attribute for each color is represented by an X; this is the color
- the text will be for the currently selected item. The background attribute
- is the color the text will be written on.
-
- Repeat steps one and two as many times as you need until you have finished
- customizing your colors. When you are done, press ESC. You will be returned
- to the Color Customization menu. If you press ESC again to return to the
- Main Menu you will be asked if you wish to save your color set.
-
- PCBoard Supported Allocations
-
- You can optionally install what are called PSAs (PCBoard Supported
- Allocations). These are features that are added into your users file.
-
- What Are Supported Allocations
-
- A supported allocation is a module you can add to your users file which both
- PCBoard and System Manager are able to understand and manipulate. These
- allocations are quite similar to TPAs you can install for doors. The
- difference is that PSAs are officially recognized by PCBoard and are used to
- add new features to your system. The following PSAs are available:
-
- Alias Support - Enables a user to use an alias in those conferences which
- have been designated to allow aliases.
-
- Full Address Support - Gives you the ability to store street, city, state,
- zip code, and country information for each user on your system.
-
- Password-Changing Support - Gives you the ability to force your users to
- change their passwords over a pre-determined amount of time.
-
- Verification Support - This PSA will store the response to the question asked
- when a new account is created on your system. You can use this response to
- help verify the validity of the caller.
-
- Caller Statistics - Provides additional statistics about each user on your
- system. Records statistics such as security violations, speed of
- connections, etc.
-
- Caller Notes - Provides you five additional comment lines which you can store
- information about each user. These lines may be useful for jotting down
- general notes.
-
- Adding An Allocation
-
- First of all, you need to make sure all nodes on your system are down -- you
- cannot add a PSA while nodes are online.
-
- To add a PSA to your system, select Add PCBoard Supported Allocations from
- the User Info File Maintenance menu in System Manager. Choose the PSA you
- wish to add to your system from the menu presented to you. Next, you will be
- shown information about the PSA you are about to install and are asked to
- confirm you wish to continue with the installation.
-
- If you received an error which said there was a sharing violation with
- USERS.INF, this indicates all of your nodes are not down or something is
- accessing your USERS.INF file. System manager needs to have exclusive access
- to that file before it can add a PSA.
-
- When you add a PSA, the size of your USERS.INF file will increase in size.
- The following lists shows how many bytes the file will increase for each
- users on your system:
-
-
- Alias - 25 bytes
- Full Address - 160 bytes
- Password Changing - 42 bytes
- Verification - 25 bytes
- Caller Statistics - 30 bytes
- Caller Notes - 300 bytes
-
- If you have 2000 users in your system, your USERS.INF will grow by 60,000
- bytes if you add the Caller Statistics PSA.
-
- Using An Allocation
-
- The following section gives specific details as far as what you can expect
- after you install each PSA in your system. You will know what changes will
- be made to your system operation and how to access the various information
- that each PSA provides.
-
- Alias
-
- Alias support is added on a conference by conference basis. After you have
- installed the Alias PSA in System Manager as outlined in the previous
- section, you need to configure which conferences will enable alias support.
-
- When you are editing conference information, you can press PgDn to access
- conference switches. You will see an option labeled Allow Aliases to be
- used. If you want aliases to be used in the conference you are editing,
- change this option to Y.
-
- In order for a user to define the alias they wish to use, the W user command
- must be used. Alias names can only be changed or created in conferences that
- have been defined to allow Aliases. The name entered must be unique -- it
- cannot duplicate any user or alias name currently in use on the system. In
- PCBSetup | Configuration Options | System Control there is an option which
- reads Allow Alias Change After Chosen. When this option is set to N, a user
- must request any alias changes be done by you. Otherwise, the alias name can
- be changed at will by using the W user command.
-
- At any time, you can edit or view the alias for any given user through System
- Manager by editing the user's record. Press F2 until you get to the Alias
- support screen. On this screen, you will see the alias name the user has
- chosen. If the field is blank, the user has not defined an alias.
-
- If you are editing the user record and you press F2 several times but do not
- see the Alias support screen, chances are you have not installed the Alias
- PSA. To make sure you have installed the PSA, check the list of installed
- TPA Areas in System Manager | User Info File Maintenance | List Installed TPA
- Areas. When you select this option, you should see a TPA called PCBALIAS. If
- you do not, you have not installed the alias PSA yet.
-
- Aliases are only active when a user joins a conference that has been defined
- to allow aliases. In the rest of the conferences, the user's real name is
- always used. Of course with users switching between their real name and
- alias name upon joining conferences, hiding the name change becomes important
- to protect the identity change.
-
- To help protect the alias, there is an option in PCBSetup | Node
- Configuration which asks Show ALIAS Names in WHO Display. If you answer Y to
- this question, PCBoard will modify the node display to show that a user is
- logging in under that node where the name change is occurring. This will
- remain for approximately one minute before it changes the actual name in the
- node display. On the other hand, if you answer N to this question, real
- names will always be displayed even when a conference is joined where aliases
- are allowed.
-
- Two other changes are made in the way PCBoard operates in order to protect
- the alias identity.
-
- While inside a conference where aliases are allowed, the security level
- requirement for the USERS command is changed to become equal to that which is
- required to use the 7 SysOp function. This enables you to still use the
- USERS command while making it impossible for normal callers to access the
- command. If users could access the command, they may be able to simply
- compare logon dates/times to figure out the real name of a particular user.
-
- The City/State information normally shown by the WHO user command or the 11
- SysOp command will not be shown when a user is using an alias. If that
- information were available to all callers, it would make it easier for other
- users to figure out the true identities of those using aliases.
-
- When a user has defined an alias either the real name or alias of the user
- can be used to login to the system. If the user chooses to login using the
- alias and the conference joined at login is not an alias conference, PCBoard
- will properly use their real name instead of their alias.
-
- Address
-
- If you want to keep track of addresses for each of your users, install the
- Address PSA. This PSA, will store lines for the street address, city, state,
- zip code and country.
-
- If you have the Address PSA installed, new users will be asked to provide
- address information when the registration questions for createing a new
- account on the system are asked. If you have existing users on your system
- who have not entered their address information, you can tell your users to
- use the W user command to update their address information, or you can use a
- PPE that is designed to assure that every user has a valid address. On Salt
- Air (the support BBS for Clark Development) you will find a PPE which will do
- this under the filename GET-ADRS.ZIP.
-
- If you clear out any of the PCBTEXT records between 699 and 704 with
- MKPCBTXT, those questions will not be asked. This would be useful if you
- want to eliminate a question such as Country from being asked.
-
- The address information can be edited via the W user command or by loading
- System Manager and editing the user record (Pressing F2 to switch between
- views). When you use the 7 SysOp Command to edit a user record, you can view
- the address information but you cannot change it.
-
- Password Changing
-
- When you install the Password Changing PSA, you add the capability to force
- your callers to change their password over the period of time that you
- specify.
-
- PCBoard will keep track of the last date the password for each user was last
- changed, the number of times they have changed it, and the last three
- passwords used. By accessing the last three passwords used, the user will be
- prevented from toggling between two or three passwords. In addition, the
- passwords chosen must contain the minimum number of characters as defined in
- PCBSetup | Configuration Options | Limits and must also not contain either
- the first or last name of the user.
-
- If you load System Manager and access a user's record, you can look at the
- password information by pressing F2 until you get to the Password Form
- screen. On this screen you will see information such as the last three
- passwords used, the last date the password was changed, etc. The Expiration
- Date is used to determine when this particular user needs to change their
- password. When the password is expired, the user cannot login to the system
- until a new valid password is entered. The following restrictions are in
- place for the new password:
-
- The new password must meet the minimum length requirements specified in
- PCBSetup | Configuration Options | Limits.
-
- Users may not use their name as their password. For example, a user named
- James Brown could not use either James or Brown as his password.
-
- Of course, if you want to expire a particular user's password, edit their
- user record so the password expiration date is equal to or earlier than
- today's date.
-
- You can control how often a user needs to change their password by changing
- the Number Days Before FORCED Password Change in PCBSetup | Configuration
- Options | Limits. If you want to temporarily disable the Password Changing
- PSA but plan on enabling it at a later date, enter a value of 0 in this field
- to disable the Password Changing support.
-
- You can warn callers of the upcoming need to change their password so they
- are not caught totally off-guard by the request to change their password. In
- PCBSetup | Configuration Options | Limits the following field can be changed:
-
- Number Days to Warn Prior to FORCED Change
-
- Set this value to the number of days you want to warn the caller before their
- password will expire. When users log into the system during the warning
- period, record number 711 in your PCBTEXT file will be displayed to let them
- know their password is about to expire.
-
- In recent years, automated calling to pick up messages or files has become
- very popular. Since PCBoard normally displays a simple one-line message to
- notify the user their password is about to expire, some of your users may
- miss the warning. If this becomes a problem on your system, you may want to
- modify this PCBTEXT record so that it displays a file (which can be multiple
- lines), or even a PPE which can leave a personal message so they could pick
- up the notification in their automated mail or file runs.
-
- Whatever warning method you ultimately choose, it should be as obvious as
- possible. Otherwise, your callers who use login scripts, automated calling
- programs, and such may wonder why they cannot log into the system properly.
- For this very reason, it might be advantageous to give a two to three week
- password expiration warning.
-
- Verification
-
- Verification support adds one 25 character field you can use to store
- information to help determine the validity of a particular caller. If you
- have the verification PSA enabled, new users will be required to answer the
- registration question. By default, this question will ask for the maiden
- name of the caller's mother. However, you can change this to ask any
- question you would like by using MKPCBTXT to edit record #706 in PCBTEXT.
-
- Once the new user enters the information, it cannot be modified. In fact,
- users cannot even view the information. The only one who can change or view
- the verification field is you.
-
- There are a lot of things you could use this verification field for. The
- following is just a short list:
-
- Birth date. You could modify record #706 in PCBTEXT so the user is asked for
- their birth date. When you view a user record with the 7 SysOp command you
- would be able to quickly and easily reference what a particular user entered
- for their birth date.
-
- Password change request. When a user fails to enter the right password for
- login, you have the capability of enabling the user to leave a comment. If
- you have that option enabled in PCBSetup | Configuration Options | System
- Control, you may want to use a PPE that could ask the user to enter their
- verification information. If they enter the right information you could use
- that same PPE to change their password.
-
- System security. If the information you distribute on your system requires
- you to be conscious about system security, you can use the verification field
- and a PPE to ask each user to enter the data in the verification field at
- each login. In essence, this will give the user a second password and would
- greatly diminish the capability of hacking a user account by the brute force
- method.
-
- Caller Statistics
-
- If you enjoy gathering statistics about your callers, you may want to enable
- the Statistics PSA. PCBoard will keep track of how many times a user has
- connected to the system, what speed they connected at, and numerous other
- pieces of information. The following is a sample of the Statistics View
- available when you are editing a user record in System Manager:
-
- To view this information for a particular user, load System Manager, select
- Users File Maintenance, and Edit Users File. Next, press F2 until you see the
- Statistics Form screen.
-
- The following list describes each of the statistics that are tracked:
-
- First Date On: This date will be equal to the date the user first logged
- into your system or the date you added the Caller Statistics PSA if the
- account already existed.
-
- Last Date On: The last date the user logged into your system. You can also
- see this date on the Long Form screen.
-
- Num Times On: The total number of times this particular caller has accessed
- your system. This information is also available on the Long Form screen.
-
-
- # Times Paged Sysop: This field will record the total number of times this
- user has paged the SysOp to chat. It does not matter if the page was
- answered or not -- all attempts are recorded.
-
- # Times Group Chat: If a user uses group chat with others on the system, the
- total number of chat sessions the user has participated in will be recorded
- in this field. SysOp chats are not included in this total.
-
- # Comments to Sysop: This field records the total number of comments the
- user has left to the SysOp using the C user command. If the user begins a
- comment but aborts the message, it does not count as a comment to the sysop.
-
- # Messages Left: This field will store the total number of messages the user
- has entered. You should be aware that while PCBoard may update this
- statistic, off-line mail reading doors may not.
-
- # Messages Read: Displays the total number of messages the user has read on
- your system. While PCBoard will update this field, some off-line mail door
- programs may not.
-
-
-
- # Security Violations: You can easily see who may be trying to access
- restricted functions on your system, by watching this field. It will total
- up the number of times a user has attempted to access a command which is not
- available to the user's security level.
-
- # Un-Reg Conf Attempts: Records the total number of attempts to join a
- conference the user is not registered to join.
-
- # Password Failures: Displays the number of times the wrong password was
- used at login. If you keep tabs on this statistic, you may be able to catch
- someone who is trying to hack into a given account.
-
- # Dnld Limit Reached: Records the total number of times the user has
- exceeded the defined download limits. Any file that will exceed the user's
- ratio or daily download limit is recorded as a violation.
-
- # Dnld File Not Found: If the user attempts to download a file, but the
- filename could not be found on disk, it will be recorded in this field.
-
- # Upld Verify Failed: After uploading a file, PCBoard will test the file via
- PCBTEST.BAT unless you have disabled upload testing. If the uploaded file
- fails the integrity tests, it will be recorded in this field.
-
-
-
- # Times On at 300: Displays the total number of times the user connected at
- 300 bps.
-
- # Times On at 1200: Displays the total number of times the user connected at
- 1200 bps.
-
- # Times On at 2400: Displays the total number of times the user connected at
- 2400 bps.
-
- # Times On at 9600: Displays the total number of times the user connected at
- 4800, 7200 or 9600 bps. All three speeds are shown in this field, because
- they are all only possible with 9600 bps modems.
-
- # Times On at 14400+: Displays the total number of times the user connected
- at 12000 bps or higher. The reason 12000 bps is included in this statistic
- is because it is a fall-back speed for 14400 connections.
-
-
- All of these statistics are stored in your USERS.INF file. Therefore, if you
- lose your USERS.INF or it becomes corrupted for some reason, you risk the
- chance of losing your statistics. In addition, you can lose your statistics
- if you re-create your USERS.INF file via System Manager | User Info File
- Maintenance | Create User Info File.
-
- Caller Notes
-
- You may find the 30 characters you are allocated in Comment 2 for each user
- may not provide enough space to enter comments about each user. If you need
- more room, you can install the Caller Notes PSA. If you do, you will find
- that you have 5 additional 60 characters lines that you can enter comments
- about each user.
-
- As you can see there is plenty of room to leave comments about any user on
- your system. The notes section provides a good place where you can enter
- things you want to remember about a particular user. Since the user cannot
- edit or even view these notes, you can be as frank as you wish.
-
- Viewing PSA Information
-
- There are two methods of viewing information on the various PSAs you have
- installed. From within System Manager each PSA will have a separate screen.
- These screens can only be viewed while you are editing a user record. Press
- F2 to switch between the various screen views. Normally, the Short Form,
- Long Form, and Conference screens are the only screens available. However,
- when you install a PSA, additional screens will become available when you
- press F2.
-
- When you are viewing PSA information in System Manager, you can also edit the
- PSA information for each user.
-
- While inside PCBoard, you can also view selected PSA Information with the 7
- SysOp command. All PSA information with the exception of the Password
- Changing, and Caller Statistics can be viewed with the 7 command.
-
-
- This is the information that will be displayed via the 7 SysOp command if you
- have all of the PSAs installed and there is information in each PSA. Notice,
- that only the Alias, Address, Notes, and Verification information is
- displayed. To edit this information or to view the rest of the PSA
- information, use System Manager.
-
- Removing An Installed PSA
-
- To remove a PSA you have installed, you will need to select System Manager |
- User Info File Maintenance | Remove PSA From User Info File simply select the
- PSA you wish to remove. If the PSA does exist, you will be asked to confirm
- that you really wish to delete the PSA. If you the PSA was not installed,
- you will receive an error message notifying you that you attempted to remove
- a PSA which is not installed.
-
- Command Line Parameters
-
- Most of the functionality of System Manager can be accessed directly by using
- command line parameters when you load PCBSM.EXE.
-
- Since you can access most common functions of System Manager from the command
- line, you can setup your event or other batch files to perform these tasks
- without actually having to move around in the menu structure or even be
- present to fill in all of the options.
-
- To specify a command line parameter, simply add it after PCBSM.EXE when you
- load it, as shown in this example:
-
-
- PCBSM.EXE /ADJUST;byteratio
-
-
- In this example, the /ADJUST is the command line parameter and byteratio is a
- sub-parameter used to specify more information or to further clarify the
- command line parameter. As shown in the previous example, you separate
- sub-parameters with semi-colons (;). You will learn more about /ADJUST in
- the detailed explanations of the command line parameters that follow.
-
- /ADJUST
-
- This command line parameter gives you the ability to adjust the security
- level of users based on their upload and download activities. You can adjust
- based on their file or byte ratio, or by the number of file transfers the
- user has completed. To control which method you will use to adjust their
- security levels, use the following sub-parameters.
-
- fileratio
-
- This sub-command will adjust the security levels of users by using the file
- ratio table you have created in System Manager | Users File Maintenance |
- Adjust Security Levels | Create Up/Dn File Ratio Table.
-
- Using this sub-parameter will perform the same action available via System
- Manager | Users File Maintenance | Adjust Security Levels | Adjust by Up/Dn
- File Ratio.
-
- byteratio
-
- This sub-command will adjust the security levels of users by using the byte
- ratio table you have created in System Manager | Users File Maintenance |
- Adjust Security Levels | Create Up/Dn Byte Ratio Table.
-
- Using this sub-parameter will perform the same action available via System
- Manager | Users File Maintenance | Adjust Security Levels | Adjust by Up/Dn
- Byte Ratio.
-
- uploads
-
- If you use this sub-parameter, the security levels of the users on your
- system will be adjusted based on the table you have setup in System Manager |
- Users File Maintenance | Adjust Security Levels | Adjust by Upload Table
-
- Using this sub-parameter is identical to System Manager | Users File
- Maintenance | Adjust Security Levels | Adjust by Number of Uploads
-
- downloads
-
- If you use this sub-parameter, the security levels of the users on your
- system will be adjusted based on the table you have setup in System Manager |
- Users File Maintenance | Adjust Security Levels | Adjust by Download Table
-
- Using this sub-parameter is identical to System Manager | Users File
- Maintenance | Adjust Security Levels | Adjust by Number of Downloads
-
- print
-
- Use this to specify you wish to print any user that have their security level
- changed. The output will go to the printer defined in System Manager. This
- is the only sub-parameter in this section that you can combine with others.
- For example, the following is perfectly valid:
-
-
- PCBSM /ADJUST;byteratio;print
-
-
- However, this example is not:
-
-
- PCBSM /ADJUST;byteratio;fileratio
-
-
-
- Example
-
- PCBSM /ADJUST;byteratio;print
-
- This command line would load System Manager and adjust security
- levels based on the byte ratio of each user. All users who have
- their security levels changed will be printed to your defined
- printer.
-
-
-
- /SECURITY
-
- This command line parameter will allow you to assign a new security level to
- an existing range of security levels on your system. For example, if you
- wished to change the security level of everyone between 20 and 30 to simply
- have security level of 25, use this parameter.
-
- lowsec:[security level]
-
- Specifies the lowest security level of the range you wish to adjust. You
- need to also use the highsec sub-parameter to specify the highest number in
- the range of security levels. Any user record that has a security level
- which is either equal to or between the lowsec and highsec sub-parameters
- will have its security level adjusted. Replace [security level] with the
- actual security level between 0 and 255 (e.g., 82).
-
- highsec:[security level]
-
- Specifies the lowest security level of the range you wish to adjust. You
- need to also use the lowsec sub-parameter to specify the lowest number in the
- range of security levels. Any user record that has a security level which is
- either equal to or between the lowsec and highsec sub-parameters will have
- its security level adjusted. Replace [security level] with the actual
- security level between 0 and 255 (e.g., 105).
-
- newsec:[security level]
-
- This sub-parameter defines what the new security level will be for the
- security levels that are specified with the lowsec and highsec
- sub-parameters. Replace [security level] with the actual security level
- between 0 and 255 (e.g., 35).
-
-
- Example
-
- PCBSM /SECURITY;lowsec:32;highsec:42;newsec:58
-
- Would change the security level of any user with a security level
- between 32 and 42 and make their new security level 58.
-
-
-
- /EXPSECURITY
-
- This parameter performs the same function as the /SECURITY parameter, but the
- expired security level is used instead of the normal security level. Using
- this parameter will prove very useful if you have a bunch of users that have
- expired security levels between 30 and 40 but you realize you can save time
- by consolidating them into one single expired level.
-
- lowsec:[security level]
-
- Specifies the lowest expired security level of the range you wish to adjust.
- You need to also use the highsec sub-parameter to specify the highest number
- in the range of expired security levels. Any user record with an expired
- security level that is either equal to or between the lowsec and highsec
- sub-parameters will have its security level adjusted. Replace [security
- level] with an expired security level between 0 and 255 (e.g., 82).
-
- highsec:[security level]
-
- Specifies the lowest security level of the range you wish to adjust. You
- need to also use the lowsec sub-parameter to specify the lowest number in the
- range of expired security levels. Any user record with an expired security
- level that is either equal to or between the lowsec and highsec
- sub-parameters will have its expired security level adjusted. Replace
- [security level] with a valid expired security level between 0 and 255 (e.g.,
- 105).
-
- newsec:[security level]
-
- This sub-parameters defines what the new security level will be for the
- security levels specified with the lowsec and highsec sub-parameters.
- Replace [security level] with the actual security level between 0 and 255
- (e.g., 35).
-
-
- Example
-
- PCBSM /EXPSECURITY;lowsec:50;highsec:70;newsec:45
-
- Will modify the user records of those who have an expired security
- level between 50 and 70. Their old expired security level will
- become 45 as specified by the newsec parameter.
-
-
-
-
-
- /COPYEXPIRED
-
- This command line parameter will change the normal security level of users
- whose subscription has expired to that of their expired security level. This
- type of change is most helpful when you do not plan on renewing the
- subscription for a particular user. Usually, the user's normal security
- level will remain unchanged so that when they renew their subscription they
- will retain their old access. Using this parameter is the same as selecting
- System Manager | Users File Maintenance | Adjust Security Levels | Change
- Security to Expired Level.
-
- print
-
- This is the only sub-parameter you may specify. If you use it, any users who
- have their security levels changed will be printed to the printer defined in
- System Manager.
-
-
- Example
-
- PCBSM.EXE /COPYEXPIRED;print
-
- This example will change the security level of any user whose
- subscription has expired. The user's normal security level will be
- set to equal their expired security level. In addition, because the
- print sub-command was specified, any user who has their record
- changed will be printed to the defined printer.
-
-
-
- /EXPIRE
-
- This command line parameter will allow you to change the expiration date of a
- group of users. The group of users who have their expiration date changed is
- based on either a range of normal or expired security levels.
-
- normalsec
-
- If you use this sub-parameter, the security levels you specify using the
- lowsec and highsec sub-parameters will be based on the normal security level
- of the user. You must select either this or the expiredsec sub-parameter to
- tell System Manager whether it should use the regular or expired security
- level.
-
- expiredsec
-
- If you use this sub-parameter, the security levels you specify using the
- lowsec and highsec sub-parameters will be based on the expired security level
- of the user. You must select either this or the normalsec sub-parameter to
- tell System Manager whether it should use the regular or expired security
- level.
-
- lowsec:[security level]
-
- This sub-parameter will specify the lowest security level for which to adjust
- the expiration date. Remember that the security level you specify will be
- based on the normal or expired security level, depending on whether you used
- the normalsec or expiredsec sub-parameter. Replace [security level] with the
- actual security level (e.g., 38). This sub-parameter is required.
-
- highsec:[security level]
-
- This sub-parameter will specify the highest security level for which to
- adjust the expiration date. Remember that the security level you specified
- will be based on the normal or expired security level, depending on whether
- you used the normalsec or expiredsec sub-parameter. Replace [security level]
- with the actual security level (e.g., 75). This sub-parameter is required.
-
- date:[date]
-
- You can modify the expiration dates for users specified via the lowsec and
- highsec parameters, either by a entering a specific date or by increasing the
- current expiration date by a set amount of days. If you use this parameter,
- the user's expiration date will be set to the calendar date entered here. The
- date you specify must be in the MMDDYY format where MM is the month, DD is
- the day, and YY is the year. You are required to use either this
- sub-parameter or the days parameter but you may not specify both.
-
- days:[number of days]
-
- You can modify the expiration dates for users specified via the lowsec and
- highsec parameters, either by a entering a specific date or by increasing the
- current expiration date by a set amount of days. If you use this parameter,
- the user's current expiration date will be increased by the number of days
- you specify. You are required to use either this sub-parameter or the date
- parameter but you may not specify both.
-
- print
-
- This parameter will print information about users whose expiration dates have
- been modified. This report will be printed to the location you specified in
- System Manager | Define Printer Port.
-
-
- Example
-
- PCBSM /EXPIRE:normalsec;lowsec:30;highsec:40;days:30
-
- This example will add 30 days to the subscription of every user who
- has a normal security level between 30 and 40.
-
-
- /GROUP
-
- This command line parameter will enable you to set or remove the three most
- commonly used conference flags for a group of users in a range of conferences
- you specify.
-
- insert
-
- Use this sub-parameter if you wish to set the flags for the conference(s) you
- specify. Using this parameter also requires that you use the first, last,
- lowsec, and highsec parameters.
-
- remove
-
- Use this sub-parameter if you wish to remove the flags for the conference(s)
- you specify. Using this parameter also requires that you use the first,
- last, lowsec, and highsec parameters.
-
- first:[conference number]
-
- This sub-parameter specifies the first conference number in which users will
- have their flags modified. This is always used in conjunction with the last
- sub-parameter to define the range of conferences to be acted upon.
-
- last:[conference number]
-
- This sub-parameter specifies the last conference number in which users will
- have their flags modified. This is always used in conjunction with the first
- sub-parameter to define the range of conferences to be acted upon.
-
- lowsec:[security level]
-
- This sub-parameter is used to define the lowest security level which will be
- affected by the conference registration flag modifications. When used in
- conjunction with the first, last, and highsec sub-parameters, the group of
- users who will have their conference registration flags modified is defined.
-
- highsec:[security level]
-
- This sub-parameter is used to define the highest security level which will be
- affected by the conference registration flag modifications. When used in
- conjunction with the first, last, and highsec sub-parameters, the group of
- users who will have their conference registration flags modified is defined.
-
- main
-
- This sub-parameter enables you to either set or remove the conference
- registration flag (R). Whether the flag is set or removed depends on whether
- you use the insert or remove sub-parameter.
-
- expired
-
- This sub-parameter enables you to set or remove the expired access flag (X).
- If you use the insert sub-parameter, the user will be given access to the
- conferences specified even if their subscription has expired. If you use the
- remove sub-parameter, the users will not have access to the conference when
- their subscription expires (assuming you have subscription mode enabled).
-
- NOTE: Setting the X flag without having an R flag set will lock the user out
- of a conference. If you really wish for a user to have non-expiring access
- to a particular conference, you should use the main sub-parameter in
- conjunction with the expired sub-parameter.
-
- scan
-
- This sub-parameter sets the scan conference flag (S). Setting this flag
- selects the conference to be included in any message scans performed, and is
- similar in effect to the user SELECT command. If a user is unable to join a
- conference where the S flag is set, the flag will be ignored and the
- conference will not be included in the scan.
-
- reset
-
- If this parameter is specified, the last message read pointer will be set to
- 0 in the conferences specified by the first and last parameters.
-
-
- Example
-
- PCBSM /GROUP;insert;first:0;last:2,lowsec:20;highsec:30;main;expired
-
- This particular example will register users who have a security level
- between 20 and 30 in conferences 0, 1, and 2. In addition to being
- registered, all users will be given access to the conference when
- their subscription expires because the expired sub-parameter is used.
-
-
-
- /INDEX
-
- Use this parameter to re-index the user file. For this operation all nodes
- do not have to be down. Normally, you will not need to re-index the user
- file because PCBoard takes care of maintaining it. However, there are
- circumstances that can occur in your system configuration (corrupt media,
- etc.) which may corrupt your index files.
-
-
- Example
-
- PCBSM /INDEX
-
- This example will index the user file making sure that it is current.
-
-
-
- /PACK
-
- Packing your user file can do the following for you:
-
- Insure the USERS, USERS.INF and user index files are all in sync with one
- another.
-
- Remove users from your system who have not called in a specified amount of
- time.
-
- Delete user records that have been marked for deletion or that have been
- locked out from the system.
-
- If you do not use any sub-parameters, System Manager will insure that the
- USERS, USERS.INF, and user index files are in sync with one another. Because
- this is a global change to the user file, all nodes must be down before
- selecting this option. Otherwise, System Manger will continually try to open
- the USERS file.
-
- remove
-
- When this sub-parameter is specified, any user who has been marked for
- deletion (ALT-D when editing user records) or who has a security level of 0
- (locked out) will be physically removed from the user file. If you do not
- want to remove users who are locked out from the system so as to prevent them
- from recreating a new account, use the lockout sub-parameter.
-
- days:[number of days]
-
- To help keep the size of your user file in check, you may wish to remove
- accounts of users who have not called in a certain number of days. This
- sub-parameter gives you this ability. Replace [number of days] with the
- actual number of days to have elapsed since the user's last call to be
- considered an inactive account which may be purged from the user file.
-
- since:[date]
-
- This sub-parameter will remove users who have not accessed the system since
- the date you specify. That date you specify must be in MMDDYY format where
- MM is the month, DD is the day, and YY is the year.
-
- expdate:[date]
-
- When you use this sub-parameter, any user who has an expiration date earlier
- than the one you specify (MMDDYY format) will be removed from the user file.
-
- keep:[security level]
-
- This sub-parameter will prevent users who have the security level you specify
- (or higher) from being removed regardless of any criteria specified.
-
- lockout
-
- When you use this sub-parameter it will prevent any users who have been
- locked out of your system (security level 0) from being deleted. Use this
- subparameter in conjunction with the remove sub-command.
-
- print
-
- Any users who are removed from the users file will be printed to the location
- you specified in System Manager | Define Printer Port
-
-
- Example
-
- PCBSM /PACK;remove;lockout;days:180
-
- The example above will remove any user who has been marked for
- deletion or who has not called within the last 180 days. Because the
- lockout parameter is specified, users who are locked out of your
- system will not be deleted.
-
-
-
- /PURGE
-
- This command line parameter is identical to the /PACK parameter except the
- entire system does not need to be down to pack the users file. This will
- enable you to perform an online pack of the users file without having to take
- the entire system down, which becomes increasingly difficult as you add more
- nodes to your system.
-
- Any user who is online when the pack is performed will not be affected. This
- means that even if the user would have been packed out with the criteria that
- you specified, the record will not be deleted because the user was currently
- online. This should not present much of a problem though, as you can pack
- the file again at a later time when the user is not online.
-
- NOTE: Online packing is disabled if you have installed the Alias PSA.
-
-
- Example
-
- PCBSM /PURGE;since:010194;keep:100
-
- The example above will remove any user who has not called since
- January 1, 1994. The keep parameter will insure that no users above
- security level 100 will be removed.
-
-
- /STANDARDIZE
-
- Use this command line parameter if you plan on sorting your users file by
- phone number, or if you desire a more "standard" looking phone number format
- for all of your users. When this parameter is specified, System Manager will
- strip all of the non-numerical data from the phone number fields and reformat
- it into the following format:
-
-
- 999 999-9999
-
-
- If a number is shorter than 10 digits, System Manager will begin formatting
- from the right. This means that if a user enters 5551212 for the phone
- number, it will be formatted as:
-
-
- 555-1212
-
-
- Example
-
- PCBSM /STANDARDIZE
-
- Adjust the home/voice and business/data phone number fields to a
- standard 999 999-9999 format.
-
-
-
-
-
- /ADDTPA
-
- This particular command line switch is designed for third party authors to
- use so they can easily install a TPA for their software without making you do
- all the hard work. This is the format of the command line:
-
- /ADDTPA;[App_Name];[Version];[Static];[Dynamic];[Keyword]
-
-
-
- App_Name The name of the application
-
- Version The version number to install (digits only)
-
- Static Represents the static size (in bytes) to allocate or 0 for none.
-
- Dynamic Represents the number of bytes to allocate for each conference or
- 0 for none.
-
- Keyword The keyword for the TPA.
-
-
- For additional information on installing a TPA, please see Add/Update Third
- Party Application earlier in this section.
-
-
- Example
-
- PCBSM /ADDTPA;mail;10;128;1;mail
-
- Add a TPA with an application name of Mail and a version number "10".
- 128 bytes will be reserved for each user on the system with an
- additional 1 byte per conference. Finally, the keyword is mail.
-
-
-
- /SORT
-
- Sorting the user file gives you a quick method to access information. For
- example, if you want to find out who has uploaded the most to your system,
- you can sort the user file by total number of bytes uploaded. When a user
- file is sorted, you have all of the users in order based on how many bytes
- they have uploaded. You can sort on a single field or with multiple fields.
-
- When you sort on a single field, select an item such as the number of times a
- user has called the system. System Manager will sort users by the total
- number of times they have called. If two users have called the same number of
- times, no attempt is made to put those users in any particular order. If you
- wish to sort these users by name, do a multi-field sort.
-
- Multi-field sorts, will sort any of the following fields:
-
-
- Security level
- Times ON
- Files download
- Files uploaded
- File ratio
- Bytes downloaded
- Bytes uploaded
- Byte ratio
-
- When using a multi-field sort by security level and two or more users have
- the same security level, System Manager will sort these users who have the
- same security level alphabetically by name. Once the users are sorted by
- name, it will move on to the next security level. As a quick example, let's
- assume you have 5 users in your system:
-
-
- JOHN SMITH Security: 10
- JIM JONES Security: 20
- SPENCER KORM Security: 20
- BILL GATES Security: 0
- PAUL BRAINERD Security: 20
-
- If you were to do a single field sort, the users will most
- likely end up in this order:
-
-
- BILL GATES Security: 0
- JOHN SMITH Security: 10
- JIM JONES Security: 20
- SPENCER KORM Security: 20
- PAUL BRAINERD Security: 20
-
-
- Notice that the security level 20 users are not sorted by name. While this
- does not present much of a problem for 5 users, it could be very annoying if
- you have 30,000 users on your system.
-
- If you do a multi-field sort based instead on security level then on name,
- the five users will be sorted in the following order:
-
- BILL GATES Security: 0
- JOHN SMITH Security: 10
- JIM JONES Security: 20
- PAUL BRAINERD Security: 20
- SPENCER KORM Security: 20
-
- With the exception of the prireverse and secreverse sub-parameters, all
- parameters specify types of sorts you can perform. If you want to perform a
- multi-field sort, use name and any of the following:
-
- security - Security level
- timeson - Times on
- dlfile - Files download
- ulfile - Files uploaded
- fratio - File ratio
- dlbyte - Bytes downloaded
- ulbyte - Bytes uploaded
- bratio - Byte ratio
-
- The following is a list of the many sub-parameters you can specify for this
- command line parameter:
-
- name Sort by user name field.
-
- password Sort by password field.
-
- dataphone Sort by the business/data phone number field.
-
- homephone Sort by the home/voice phone number field.
-
- expdate Sort by the expiration date of each user.
-
- usercomment Sort by the comment #1 field.
-
- sysopcomment Sort by the comment #2 field.
-
- city Sort by the city field.
-
- security Sort by the security level field.
-
- timeson Sort by the number of times the user has successfully logged
- in.
-
- dlfile Sort by the number of files downloaded.
-
- upfile Sort by the number of files uploaded.
-
- fratio Sort by the file ratio.
-
- dlbyte Sort by the number of bytes downloaded.
-
- upbyte Sort by the number of bytes uploaded.
-
- bratio Sort by the byte ratio.
-
- reverse This sub-parameter is used when you sort by a single field.
- If you use it, the records will be sorted in reverse order.
- For example, if you sort by security level, the highest
- security level will be first in the user file and the lowest
- security level will be the last record in the file.
-
- prireverse This sub-parameter is used in conjunction with multiple field
- sorts. Normally sorts are performed in ascending order.
- When you use this parameter, the primary sort field will be
- sorted in descending order.
-
- secreverse Since the only field you can use as a secondary field is the
- user name, this will cause any duplicates caught by the first
- sort field to be sorted by name in reverse order. This means
- that William Plasger will be placed before Andrew Leaver.
-
-
- Examples
-
- PCBSM /SORT:security;reverse
-
- Sort the user file by security in reverse order placing those
- with the highest security level at the beginning of the file.
-
- PCBSM /SORT:dlbyte;name;prireverse
-
- Sort the user file by the number of bytes downloaded (in reverse
- order) placing those who have downloaded the most towards the
- beginning of the user file. If two users have the same number of
- bytes downloaded, they will be sorted by name to determine who should
- be placed first in the user file.
-
-
-
- /RETRY:[max number of retries]
-
- This command line parameter specifies the number of attempts System Manager
- should retry on an error. Most commonly, the error will occur when trying to
- access the USER file when all nodes are not down. However, it is conceivable
- for the error to be an error reading from disk or other critical error.
-
- When you are using the command line parameters to run System Manager in your
- event, this command line parameter can prove very useful. With the exception
- of the /PURGE, /INDEX, /RETRY, and /FILE command line parameters, all others
- require all nodes to be down before proceeding. If all nodes are not down,
- System Manager will make continuous attempts every 10 seconds to access the
- USERS file until it becomes free.
-
- Of course there is a real problem if you are trying to sort the user file in
- your 1:00 am event but one of your nodes either failed to go down for the
- event or was improperly configured. If you were not to catch this until 7:00
- am the next morning, you could have lost 6 hours of dial-in time. In a
- situation like this, using the /RETRY parameter to make 10 retry attempts and
- then exit to DOS (returning control to your event batch file) is very
- advantageous.
-
-
- Example
-
- PCBSM /PACK;remove /RETRY:20
-
- The example above would pack the users file removing any user that
- has been marked for deletion or who has a security level of 0.
- Should an error occur, 20 attempts will be made before System Manager
- will finally abort the attempt.
-
-
- /FILE:[location of PCBOARD.DAT]
-
- System Manager needs to access the PCBOARD.DAT file so it can determine where
- your user files (and other configuration files) are stored. Normally, System
- Manager will only look in the current directory for the PCBOARD.DAT file.
- However, you can tell it where to find the file by using this command line
- parameter.
-
- Simply replace [location of PCBOARD.DAT] with the full path and filename
- where it can be found (e.g., C:\PCB\PCBOARD.DAT).
-
-
- Example
-
- PCBSM /FILE:H:\SHARE\PCBOARD.DAT
-
- The example above will load System Manager and specify that it should
- use the PCBOARD.DAT located in H:\SHARE to find the information about
- PCBoard.
-
-