BULLETIN BOARD NAME Enter the name of your Bulletin Board. This name is displayedto all callers at logon. SYSOP NAME The SysOp Name is displayed during program execution. When aSysOp leaves or receives a message, this name is indicated inthe message header (unless otherwise specified under the UseReal Name field below). This name must be the same name used when FeatherNet BBS isregistered. MAIN BULLETIN BOARD DIRECTORY Enter the Main file directory for your BBS. Be sure & includethis directory in your systems PATH statement within yourautoexec.bat file found in your root directory. Example: C:\FNET SYSOP MAIL SECURITY LEVEL Enter the access level required to read or delete mail in allconferences. Assign this security level only to those usersyou have full trust and confidence in. It is recommended thatonly the SysOp and Co-SysOps be given this level. ENABLE THE [TODAY] FUNCTION Enter a "Y" to enable the TODAY function. You "MUST" have thefile "TODAYxx.EXE" (where xx = the current version number) ora similar program. You should create two files with your"TODAY" program, an ASCII and an ANSI version (if desired).The path and filename of the ANSI version "MUST" be placed inthe "File Locations (2)" configuration. NOTICE ────── The "TODAY" program should be run in conjunction with an EVENTor in the "$$LOGON.BAT" file which is run when each user logsonto the BBS. MODEM INITIALIZATION STRING Enter the Initialization string for your modem. This will varyfrom modem to modem depending on the modem's characteristics.A general string for all modems is: ATE0Q0M1V1S0=0S2=1S7=45&C1&D2H0 OPEN BAUD RATE (300-115200) Enter the speed to open your modem at. This is usually thehighest speed your modem will handle. Typically if the modemis an error correcting modem, you would set the modem 2 stepshigher than the actual speed. Refer to your modems documenta-tion for further information. Examples: 300, 1200, 2400 4800, 9600, 19200 38400, 57600, 115200 LOCK COMM PORT AT OPENING BAUD RATE Enter a "Y" if you wish to "LOCK" the computer to modem speedat the "opening" baud rate. If your modem has a maximum speed of 2400 you will normallyanswer "N" to this question. However, if you run a high speedmodem (9600 or faster) you would probably want to answer "Y"to this field. NEW CALLER SECURITY Enter the security level to be assigned new users, 0 to 255. This security level, as all levels, "MUST" be included in the"PWRD" file. See the FNET.DOC file for the format of the PWRD file. ENABLE QUESTIONAIRES Enter a "Y" if you wish to enable script questionaires or an"N" to disable the questionaire function. NUMBER OF QUESTIONAIRES Enter the number of questionaires available to users. SECONDS TO WAIT FOR CARRIER Enter the number of seconds the BBS should wait for a carrierafter it has issued the answer command to the modem. Some modems, particularly high-speed types with the v.32 orv.42 standards, have a considerably longer carrier detectionhandshake. If you have one of these modems, or a US RoboticsDual Standard modem, ensure you set this value to at least 45seconds. EVENT LIST FILE PATH & FILENAME Enter the path and filename of the event .LST (configuration)file. This file will contain information on event times, days,dates and mode of execution to be utilized. FeatherNet v4.2added support for multiple events with up to 99 supported pernode. Each node has its own event configuration file. Example: C:\FNET\EVENTS\EVENT.LST TIME TO RUN EVENT Enter the time that your scheduled nightly event is to bebegin. This time is based on a 24 hour clock. 10:00pm wouldbe entered as 22:00 while 4:30am would be entered as 04:30. It is strongly recommended that your event is "NOT" run atmidnight (24:00) to avoid the possibility of a time conflictwith the computers internal clock. Suggestion: If you want to run your nightly event at midnight, you might set this field to 00:05 (5 minutes after midnight) MINIMUM BAUD RATE ALLOWED Enter the minimum baud rate you will allow callers to connectat and "continue" with the session. Baud rates lower than the speed you enter will be notifiedthat their connect baud rate is not currently allowed and willbe immediately logged off. REGISTRATION NUMBER Enter the registration number issued to you when you receivedyour registered version of FeatherNet BBS Software. If you have not registered FeatherNet, enter a "0" until youhave decided to register. ADD CUSTOM "ZIP" COMMENTS Enter a "Y" if you wish all uploads to receive a "custom" zipcomment. Otherwise enter "N". Read the documentation within the "FNZIPCMT.ZIP" for an easysetup of custom "zip" comments. MINIMUM UPLOAD DRIVE SPACE (KBYTES) Enter the number of kilobytes which "MUST" be free on yourupload drive before an upload is permitted. This number is multiplied by 1024 to get the actual number ofbytes that "MUST" be free. NUMBER OF BULLETINS Enter the number of bulletins currently available for reading.WORK DIRECTORY Enter the work directory for "THIS" NODE. This directory MUSTbe unique to this node. "NO PERMANENT FILES" should ever bestored in this directory. The directory is purged each call. Safeguards prohibit you from selecting your BBS node or BBSmain directory as the work directory. MAXIMUM NUMBER OF MESSAGES TO CAPTURE This value determines the maximum number of messages that canbe archived into the capture file. Keep in mind that the captured messages are processed in theNODE WORK directory. If the work directory is a ram disk itcould fill up and the capture command will fail. OPERATE IN A SUBSCRIPTION MODE Enter "Y" if you desire the BBS to be operated in a paidsubscription mode. When a subscription expires FeatherNet willreduce the security level to the "expired" level. DAYS WARNING BEFORE SUBSCRIPTION EXPIRES A warning notice will be displayed to any user whose subscrip-tion is expiring within the number of days entered here. EXPIRED SUBSCRIPTION SECURITY LEVEL Enter the security level to be assigned to users when their subscription expires. OPERATE IN A RINGBACK MODE Enter a "Y" if you wish the BBS to operate in a RINGBACK mode.This is handy when only one phone line is available and youwish the BBS and the "folks" to share it without a hassle. See the FNET.DOC file for an explaination of this mode ofoperation. SECONDS TO WAIT FOR RINGBACK Enter the number of seconds the BBS will wait for the RINGBACKcall if operating in ringback mode. 45-60 secs are suggestedvalues. If a ringback does not occur in the time allowed the"RINGBACK" is canceled and the BBS awaits the initial ring. NODE NUMBER Enter the node number you are configuring. If you're running asingle node BBS, this node number will be 1. NOTE: Each node you configure "MUST" have a unique number. COMM PORT (0-8) Enter a number 0-8 to indicate the serial port this node willwill be using. If you want to run a "LOCAL" node such as for maintenance ortesting, you should enter a "0" in this field. This is thedefault when FeatherNet is initially installed. NODE DIRECTORY Enter the path from which this NODE is to be operated from. Example: C:\FNET\NODE1 NOTE: Be sure and set the Read-Only file attribute of ALL the .EXE, .COM and .BAT files in your \FNET directory. USING A "FRONT-END" LOADER Enter "Y" if you desire to utilize a "FRONT-END" loader toload Feathernet when a call is received. The following parameters are used to determine the caller'sbaud rate and type of connection. These are passed in theSFN.BAT file by using the baud rate information the FRONT-ENDfurnishes. /C:0 (Local Logon) /C:8 (SysOp Logon) /C:[Baud Rate 300 - 115200] If a caller connects with an error correcting modem ( to yourerror correcting modem ) "/ERR" should also be passed. Example in your SFN.BAT file: FNET /C:14400 /ERR OPERATING UNDER DESQVIEW Enter a "Y" if you are running FeatherNet under DesqView fromQuarterDeck Office Systems. FeatherNet will automatically return "TIME SLICES" to the CPUwhen the BBS is idle or waiting for input from a caller. Try this option if you are using another multitasker as well. ADD "UPLOADED BY" TO DESCRIPTION Enter "Y" if you want feathernet to add "Uploaded by: " & thecaller's name to the file description after each upload. ENABLE HIGH ASCII FILTER Enter "Y" if you wish to filter all ASCII characters above #127. These are normally associated with line noise. IF your have foreign (non U.S.A.) callers using your system you might want to leave this option OFF ("N") LOCATION OF SECURITY LEVEL MESSAGES Enter the drive & directory where the security level specificmessage text files are located. Example: C:\FNET\SECMSG\ These files MUST be named the access level for which they areintended to be shown during the logon sequence. Example file names: "10" "30" "50" "115" "255" MINUTES BEFORE FEATHERNET RECYCLES Enter the number of minutes before FeatherNet will terminate &allow the "SFN.BAT" file to re-load the BBS and reset themodem when waiting for a call. This is available due to some modems becoming "DEAD" after aperiod of being idle. This is generally only necessary ifrunning under an emulated multitasker such as DESQVIEW. DUPLICATE UPLOAD "HOLD" DIRECTORY Enter the path to the directory you wish ALL uploaded fileswhich are duplicates of files already in the UPLOAD directoryto be moved into. NOTE: This prevents a user from causing a file in the "UPLOAD" directory to be overwritten by a file with the same name Example: C:\FNET\DUPES\ DOWNLOAD SECURITY LEVEL Enter the security level required to use the [D] command fromthe file transfer area to "DOWNLOAD" files from the BBS to theuser's system. NOTE: This "MUST" be 0-255 UPLOAD SECURITY LEVEL Enter the security level required to use the [U] command fromthe file transfer area to "UPLOAD" files to the BBS from theuser's system. NOTE: This "MUST" be 0-255 FILE TRANSFER AREA SECURITY LEVEL Enter the security level required to use the [F] command fromthe main BBS menu or from a conference to enter the filetransfer area. NOTE: This "MUST" be 0-255 USE COLOR GRAPHICS DURING A LOCAL LOGON Enter "Y" if you wish the BBS to be in color mode when youlogon locally. Color may be turned off/on at the Main Menu with the [S]command regardless of this setting. FORCE USERS INTO A DOOR AT LOGON Enter the number of the door you wish users with a specificsecurity level to be "FORCED" into during the logon sequence. Enter a "0" if you do NOT wish to utilize this function. TIME CREDIT FOR UPLOADS Enter the amount of time to be credited to a user for upload-ing files. This number may have 2 decimal places. A credit of "0" will charge the user the amount of time theupload sequence lasted with no credit given. A credit of 1.0 will make the time of the upload "FREE" time. A credit of 2.0 will increase the users time the "SAME" amountof time it took to upload the file when completed. SECURITY LEVEL TO BE "FORCED" INTO A DOOR Enter the security level to be "FORCED" into a door during thelogon sequence. This is effective only if the above option hasa door number entered. PROMPT CALLERS AT LOGOFF IF "DOWNLOAD FLAGS" ARE SET Enter a "Y" if you wish to prompt users at logoff who havefiles flagged for download. This will give them another chanceto download the files before the flags are RESET after logoff.PROMPT CALLERS TO SET MESSAGE POINTERS AT LOGOFF Enter "Y" if you desire to have the callers asked if they wanttheir "HIGH" message read flags to be set to the highestmessage in each conference defined for the BBS. The advantage of setting the high message read pointer to thehighest message in each conference is that callers who usuallyonly read "PRIVATE" mail will keep their high message readupdated. A user reading private mail or public mail addressedto him during the logon sequence does not get the message readpointers updated. USE A "CUSTOM" PROGRAM OR BATCH FILE TO CHECK UPLOADS Enter "Y" if you desire to use a custom or SysOp chosen batch file or program to test uploads or check for virii. Keep in mind that the file "FNCHK.EXE" is a Vital & necessarypart of FeatherNet and MUST remain in the DOS path for the BBSto properly handle newly uploaded files. FNCHK.EXE will updatethe "UPLOADS" or "PRIVATE" directory list files. NAME OF CUSTOM PROGRAM OR BATCH FILE TO CHECK UPLOADS Enter the file name ( 12 characters max! ) of the program or"BATCH" file to run immediately "AFTER" an upload sequence iscompleted. This file "MUST" reside in each Node directory. SHELL TO EXTERNAL PROTOCOLS AND ARCHIVE MANIPULATIONS Enter a "Y" if you desire FeatherNet to "SHELL" to ALL theexternal protocols and archive manipulations. This will mean a considerable speed increase in the BBS opera-tion in these evolutions. PATH & NAME OF "FOSSIL" DRIVER BATCH FILE ** ( ONLY Necessary IF You "SHELL" to File Transfers ) ** Enter the path & filename of a batch file to re-activate thefossil driver after a file transfer. Example: C:\FNET\BNU1.BAT The serial port can be effectively disabled by the protocoldriver upon termination of the transfer. If you desire to usethe "SHELL" to protocols, make a batch file in each nodedirectory which "Activates the Fossil Driver". A batch filefor the "BNU" fossil driver used on comm port #1 would be: BNU /I=0+ SWAP FEATHERNET TO XMS, EMS, OR DISK DURING A "SHELL" FeatherNet "SHELLS" to DOS when the Sysop presses the <F9> keyor when running FNCFG.EXE, FNETSM.EXE or FNFILER.EXE fromwithin the BBS. SHELLing is also performed if the above optionis set to "Y". Entering a "Y" will cause FeatherNet to attempt to SWAP itselfto Extended Memory (supplied by an XMS driver, such as HIMEM.SYS), Expanded Memory (EMS v4.0) or disk, thus freeing upmore memory for DOS. If attempts to swap using all three methods fail the BBS willSHELL while remaining in DOS memory. SECURITY LEVEL TO LIST USERS WITH [U] COMMAND Enter the security level required to list users with the [U]Command from the Main Menu (0-255) TODAY'S CALLERS SECURITY LEVEL Enter the security level required to utilize the command[T]oday's callers from the main menu area (0-255). ALLOW [P]RIVATE FILE TRANSFERS Enter "Y" if you wish to give specific users the ability toupload & download PRIVATE files. A user may only send privatefiles to another user who is authorized this function by theSysOp. LOCATION OF THE PRIVATE FILE TRANSFER FILE DIRECTORY Enter the "Complete" DOS directory path to the [P]rivate fileupload directory. This directory will contain PRIVATE filesauthorized users send to other authorized users. Example: C:\FNET\FILES\PRIV\ PAUSE FOR 3 SECONDS AFTER CONNECT AT 2400 OR LESS BAUD Enter a "Y" if the BBS should pause for 3 seconds after aCONNECTION is established at 2400 or less baud. Some modemstake longer than others in detecting the baud rate. As a rule of thumb, if there is a 2 to 4 second delay from thetime the modem establishes a connection until the "CONNECT"message is reported, then you should answer "Y" to this field.SECURITY LEVEL TO ARCHIVE & DOWNLOAD MAIL Enter the security level (0-255) required to archive anddownload mail. ALLOW THE USE OF SPLIT-SCREEN CHAT MODE Enter a "Y" if you want the Split Screen Chat mode availableto callers with ANSI capability detected at logon. The SplitScreen Chat mode allows the simultaneous sending and receivingof data thus increasing the efficiency of the chatmode. FORCE ALL USERS TO SELECT FILE TRANSFER PROTOCOL Enter a "Y" to force all users to select the file transferprotocol after they enter a [D] or [U] from the file transferarea. Users taking advantage of the "command stacking" featurewill not be forced to select a protocol. RUNNING UNDER A MULTITASKER OR NETWORK Y = If you are operating FeatherNet within a Multitasking environment, such as DESQview or OS/2, or a Network such as Lantastic or Novell. N = If you are running a Single NODE under OS/2, MS/PC DOS or a 100% compatible DOS emulator. DISABLE THE AUTO ANSI DETECT FUNCTION AT LOGON Some networks apparently have trouble dealing with the ANSIstatus request ("n"). This option allows the SysOp tocompletely disable the ANSI detection at logon. Disabling the Auto ANSI will mean ALL users will not have thequicker ANSI cursor movement sequences available unless theyare using the Visual Message Editor. Ensure the "Apparent Problem" with the Auto ANSI detectsequence is NOT unique to 1 user which may be a configurationproblem. If you disable Auto ANSI you also disable the splitscreen chat mode. DEFAULT NEW USER SUBSCRIPTION EXPIRATION IN DAYS Enter the default number of days you want new users to haveuntil their subscription is expired. Previously, FeatherNetdefaulted to 5 days. This may now be 0 - 999 days. SYSOP PAGE START TIME Enter the time of day (24 hour format) that SysOp paging is allowed to begin. When the Sysop Page is turned OFF, the Sysop cannot be Paged. If you are only available from 17:00 to 22:00 you may want touse these times as the chat page start and stop times. SYSOP PAGE STOP TIME Enter the time of day (24 hour format) that SysOp paging is toend. When the Sysop Page is turned OFF, the Sysop cannot be Paged. If you are only available from 17:00 to 22:00 you may want touse these times as the chat page start and stop times. ALLOW "ALIASES" OR ONE-NAME USERS Enter a "Y" if you want to allow users to logon with Aliases(also known as Handles) or with ONE name. All user names mustbegin with letters between A thru Z. ALLOW THE "SYSOP" TO LOGON REMOTELY Enter a "Y" if you want to allow the user named "SYSOP" tologon remotely. If you do so, ensure the password you haveassigned this user record is "VERY" unique. SHIFTED FUNCTION KEY ASSIGNMENTS You may enter up to 10 SHIFTED function key assignments. These"Strings" may be entered at the local keyboard instead ofhaving to type the text in each time. For example, you could set the <F1> key to send the string"F N S A" when you are at the Main Menu to scan for new filesin all directories. By assigning your "Signature" to a key,you will only have to press the SHIFT and function key to signa message. Place "^M" in the definition to simulate pressingthe ENTER key. Examples: Ron Pierce^M F N S A^M LIMIT SYSOP PAGING HOURS This allows you to disable the hours the SysOp is available for chat. If this options is selected to "N" then users may page theSysOp at any time provided the SysOp has the chat page turnedon. DOWNLOAD BATCH FILE PATH & FILENAME Enter the Full path and filename of a batch file to executewhen a file download is performed. This allows you to do anything your system might need to doPrior To and After a file transfer. If configured, the batchfile is again run AFTER the file transfer with a paramater of"1" so you can tell your batch file to "GOTO" the proper labelfor anything you might need to do AFTER the file transfer,such as reinitializing a disk cache. A sample transfer batch file "XFERBAT.BAT" contains suggestedbatch file syntax. Example: C:\FNET\FNSYS\XFERBAT.BAT PATH AND FILENAME OF "FNETTEXT" FILE Enter the Full DOS path and filename for the "FNETTEXT" file. This option allows you to utilize a RAM drive for fasteraccess to the file and less wear and tear on your hard disk. Example: C:\FNET\FNSYS\FNETTEXT DIRECTORY CONTROL FILE OPTIONS SELECTION Enter an "A" to ADD a Directory Control File. Enter a "D" to DELETE an existing Directory Control File. You may also enter the number of an existing Directory ControlFile to edit. EDITING DIRECTORY CONTROL FILE PARAMATERS Enter "Y" to edit the paramaters of the Selected DirectoryControl File. MENU FOR DIRECTORY LISTINGS Enter the path and filename of the Test/ANSI/RIP file for thisconference's directory listings. Example: C:\FNET\CONF0000\DIRM MAXIMUM LINES TO DISPLAY WHEN READING FROM ARCHIVE Enter the maximum number of lines users will be allowed toread when performing archive manipulations. This allows the Sysop to prevent users from capturing completetext files and bypassing download byte limitations. PATH/PARTIAL NAME FOR DIRXX FILES Enter the path and "PARTIAL" filename for the directorylisting files for this control directory. The "name" MUST be 5or fewer characters as FeatherNet will append the actualdirectory number to this "NAME" when accessing the DIRxx files The reason for "PARTIAL" is the directory number would beappended to the end. Example: C:\FNET\DIR NOTE: The actual names of the DIRxx files would be: DIR001, DIR002, DIR003, etc... DESCRIPTION FOR THIS DIRECTORY CONTROL FILE Enter a one line description for this Directory Control File. This description is for use in FNCFG.EXE, FeatherNet's Config-uration Utility, and is not needed. It can be used to remindthe Sysop what the files in each Control Directory pertain to.NAME OF THIS FILE CONTROL (DIR.LST) DIRECTORY Enter a legal DOS file name for this Control Directory. The Directory Control file contains the information FeatherNetuses to determine the number of file areas, access to fileareas, additional download paths, new uploads directory listinand path/name of description files (DIRxx files). Example: DIR.LST MENU FILE FOR THIS CONTROL DIRECTORY Enter the full path and name of the menu file for this ControlDirectory. The file name should be 7 or fewer characters sincean ANSI (COLOR) version may also be used. If used, the file name of the ANSI version MUST end with "G". Example: C:\FNET\CF0000\DIRM1 IF you wanted to also use an ANSI version of the above file(NOT required), its name would be "C:\FNET\DIRM1G" DELETE WHICH CONTROL DIRECTORY Enter the number of the control directory to delete. Justpress [ENTER] to abort the deletion process. EDIT FILE DIRECTORY INFORMATION Enter the # of a file directory to edit. Enter "P" to edit the path of the UPLOAD description file. Enter "Q" to QUIT the directory editing options. Enter "I" to insert a NEW file directory. Enter "U" to edit the path where new uploads will be placed. TITLE OF THIS FILE DIRECTORY The TITLE is generally a brief description of the files whichare located in the directory listing. Sample titles: MS-DOS Utilities Telecomunications Programs FeatherNet Software Files SECURITY LEVEL REQUIRED FOR THIS DIRECTORY You can limit access to the files in this directory as well asthe displaying of the files listing for this directory bysecurity level. Enter the security level required to view the files in thisdirectory and download them (0 - 255). LOCATION OF FILES FOR THIS DIRECTORY Enter the DOS directory in which files for this directory willbe located. This can be any directory in your system. Example: D:\FNET\FILES\CF0000\DL01\ FILE SEARCH METHOD The "SEARCH METHOD" is the method which FeatherNet will use tolocate files on disk. The "DOS" method checks the actual DOS directories for files. The "INDEX" method utilizes an index file created with the"DIRNDX.EXE" program. You MUST have an index file created touse the INDEX method or problems will certainly arise. If youuse a CD-ROM, the INDEX method is recommended, otherwise usethe DOS method. Press ENTER to toggle the "SEARCH METHOD". Use the Up/Down arrows to move to another item. DELETE A FILE DIRECTORY Enter the number of the file directory to delete. Press the<ENTER> key to abort the deletion process. UPLOAD DESCRIPTION FILE (PUBLIC UPLOADS) Enter the path and filename of the file to contain thedescriptions for new public uploads in this conference. Thesefiles are available for downloading if a user's security levelis sufficient. Example: C:\FNET\CONF0000\DIRUP CONFERENCE UPLOAD FILE PATH Enter the "UPLOAD" file path. This is the DOS directory whichnew uploads will be kept in after being uploaded. Note thatnew files are RECEIVED in the NODE work directory, then movedto this UPLOAD directory after being tested/verified. Example: C:\FNET\FILES\CONF0000\UPL\ UPLOAD DIRECTORY SECURITY LEVEL Enter the security level required to download files from theupload file directory and to list the files and descriptions of these files. The security level may be from 0-255. Press "ENTER" to toggle the "search method". Use the Up/Down arrows to move to another item. Press <F1> for additional help on this topic. ADDITIONAL DOWNLOAD DIRECTORY MENU Enter the # of an additional download directory to Edit. An "ADDITIONAL DOWNLOAD DIRECTORY" can be any directory onyour computer system in which you have files available fordownloading. Enter "A" to Add an additional download directory. Enter "D" to Delete the additional download directory. Enter "Q" to Quit! NOTE: You should not use a directory already configured for a specific file directory as an additional download directory. This would serve no useful purpose. ENTER ADDITIONAL DOWNLOAD DIRECTORY PATH Enter the DOS path for this additional download directory. This may be any directory on your system or on a CD-ROM. Thedirectory is protected by security level but ensure you do notallow anyone access to your BBS system files. Example: C:\FNET\FILES\ALT001\ SECURITY LEVEL FOR THIS ADDITIONAL DOS DIRECTORY Enter the security level required to download files from thisAdditional DOS Directory. The security level may be from 0-255. DELETE ADDITIONAL DOWNLOAD DIRECTORY PATH Enter the number of an Additional Download Directory to deleteCONFERENCE CONFIGURATION OPTIONS Enter the # of a Conference to edit. Enter "A" to add a conference (maximum conferences is 512). Enter "L" to list conference information. Enter "Q" to Quit! DELETE A CONFERENCE Enter the Conference number to delete. You will be prompted tocontinue the deletion PRIOR to the deletion. CONFERENCE CONFIGURATION MENU Select an item to edit for the conference you are configuringor modifying. Enter a # (1-9) corresponding to the item to beedited. Press <ENTER> or <Q> to abort. CONFERENCE NAME Enter the name of this conference (25 characters max!). Example: Assembly Programming READ SECURITY LEVEL Enter the security level required to read messages in thisconference (0-255). This setting, along with the userssecurity level, allows you to control access to conferences. MESSAGE BLOCKS Enter the number of message blocks to allocate to thisconference (1-8). Each message block allows up to 1024messages to be contained in the message file for a givenconference. The maximum number of message blocks is 8 whichallows up to 8192 messages for a conference. REPLY SECURITY LEVEL Enter the security level required to reply to a message afterreading it (0-255). This setting, along with the userssecurity level allows you to limit a user to being able toread messages but not being able to reply to a message afterreading it. WRITE SECURITY LEVEL Enter the security level required to enter a new message(0-255). This setting, along with the users security level,allows you to control the priviledge of writing messages. MESSAGE FILE PATH & FILENAME Enter the complete file path & filename for this conference'smessages. Example: C:\FNET\CONF0001\MSGS NOTE: The message file name "MUST NOT" have a file extension. There is an accompanying index file created with each message file. It has an ".NDX" file extension appended to the name of the message file. DIRECTORY LISTING CONTROL FILE FOR THIS CONFERENCE Enter the path and filename of the directory listing file touse with this conference. Assigning a directory listing file to a conference enablesfile transfers within a conference. Users with proper security level may use the [F] command afterjoining the conference and perform file transfer functions onthe files available. Example: C:\FNET\CONF0001\DIR.LST ECHO THIS CONFERENCE "ECHO" refers to a conference's messages being connected toother systems via a netmail or a relay mail network. Enter a "Y" if this conference is to be echoable, else an "N".MAKE THIS A PUBLIC CONFERENCE A public conference is one that ANY user may join provided hissecurity level is sufficient. A private conference is one in which the Sysop MUST grantaccess to individual users with the FeatherNet User Editor(FNETSM). A user MUST have the required security level to joina private conference as well. DOWNLOAD PATHS LISTING FILE Enter the path and filename of the file which will contain thepaths to the files available for downloading in this conf. This file may be shared by other conferences to allow users todownload from other conferences. A popular configuration is todefine one download path file and use it for each conference. Example: C:\FNET\CONF0001\DLPATH.LST SECURITY LEVEL REQUIRED TO KILL A MESSAGE Enter the security level (0-255) required to KILL a messageaddressed TO or written BY a user. DOOR BATCH FILENAME This is the name of the door. Example: FNMAIL The name entered here corresponds with the "EXACT" name of thedoor file on disk. That is, "FNMAIL". The file "FNMAIL"would then be copied to "DOOR.BAT" by FeatherNet prior toexecuting the door. The location of the file is determined by your answer to thepath question. When blank, the the default directory is assumed. DOOR PASSWORD If a password is entered in this field then the caller must know the password (if he does not have Sysop Access) in orderto open this door. If the field is blank, then no password isrequired from the user. DOOR SECURITY LEVEL Enter the security level required for a caller to open thisdoor (0 - 255). AUTO LOGIN DOORS When a caller logs on, FeatherNet will check the DOORS.DATfile for any Auto Login Doors which are specified by answeringYES under this column. A user having a security level that matches that which is specified under the Security Level column will then be sentinto the door automatically, as part of the logon process. CREATE DOOR.SYS FILE Enter a "Y" if you want FeatherNet to create a "DOOR.SYS" filefor programs which require it. SHELL / SWAP TO DOOR Y = Yes, shell out to the DOOR (gives faster return from door) S = SWAP FeatherNet out during the shell. N = Do not shell, exit FeatherNet completely. NOTE: The DOOR file should end with a call to R.BAT if this switch is set to "N" and should NOT end with SFN.BAT if set to "Y" or "S" (i.e. when shelling FeatherNet is already loaded so it the door file need not re-load it, but when not shelling the software must be reloaded in order to continue). PATH TO DOOR BATCH FILE Enter the path to the door batch file. FeatherNet will look inthe specified directory for the door batch file if you enter apath. Otherwise, the NODE directory will be searched for the door batch file. Example Door Batch File Path: C:\FNET\FNMAIL\ SECURITY LEVEL FOR DOWNLOAD PATH Enter the security level required to access files in thispath. The security level must be 0-255. This controls accessto this path for any file functions (i.e. download, archivemanipulations, reading text file). DIRECTORY LISTING FILE NAME Enter the path and filename of the file which will contain thedescriptions for the files available for downloading from thisentry. This is sometimes referred to as the DIRxx file. Example: C:\FNET\CONF0001\DIR001 DOWNLOAD PATH Enter the default download path for this entry. FeatherNet will search this directory and those in the DLPATH.LST (type) file for files. Example: C:\FNET\CONF0001\DL001\ DIRECTORY SECURITY LEVEL FeatherNet imposes a security level restraint on "EACH" file directory listing as well as each download path. Users may not view the directory listing unless they haveproper security level. Enter the security level required for this directory (0-255). TITLE OF DIRECTORY Enter a "TITLE" for this directory. It is normally related tothe type of files included and available for download. Example: General Dos Utilities UPLOAD DESCRIPTION FILE (PRIVATE UPLOADS) Enter the path and filename of the file to contain the descriptions for new PRIVATE uploads in this conference. These files are available for downloading if a user's securitylevel is sufficient. Example: C:\FNET\CONF0001\DIRPV PRIVATE UPLOAD FILE PATH Enter the PRIVATE UPLOAD file path. This is the DOS directorywhere the new PRIVATE uploads will be kept. NOTE: New files are RECEIVED in the NODE work directory then moved to this PRIVATE UPLOAD directory after being tested/verified. Example: C:\FNET\CONF0001\PRIVUL\ PRIVATE UPLOAD DIRECTORY SECURITY LEVEL Enter the security level required to download files from thePRIVATE UPLOAD file directory and to list the files and descriptions of these files. The security level may 0-255. INDEX FILE NAME Enter the path and filename of the INDEX file to use (if any)for locating files available for downloading within this conference. This feature is usually desired "ONLY" if you utilize a CD-ROM for storage of download files due to the slowseek times they have. If you enter a path and filename for this entry, ONLY theindex file will be accessed to locate files. You should ensure you have properly created an index file which includesall the possible paths to files in this conference (less theUPLOAD and PRIVATE UPLOAD directories). Example: C:\FNET\CF0000\DLPATH.NDX DOWNLOAD PATH Enter a download path for this entry. This must be a directoryon your hard drive or a CD-ROM. FeatherNet will search thisdirectory file for files if a users security level issufficient. Example: D:\UTILS\ SECURITY LEVEL TO CARBON COPY MESSAGES Enter the security level required for a user to send a "CarbonCopy" of a message to another user (0-255). A user witha sufficient security level can send as many "CC" messages ashe or she wishes. BULLETIN MENU FILE Enter the path and filename for the Bulletin Menu file forthis conference. You may share the same file for both ASCII and ANSI versions if you use wish. Example: C:\FNET\CONF0001\BLTM BULLETIN LIST FILE Enter the path and filename for the Bulletin Listing file forthis conference. Example: C:\FNET\CONF0001\BLT.LST DOOR MENU FILE Enter the path and filename for the Door Menu file for thisconference. You may share the same file for both ASCII andANSI versions if you use wish. Example: C:\FNET\CONF0001\DORM DOOR MENU FILE Enter the path and filename for the Door Menu file for thisconference. This may be an ASCII/ANSI/RIP file. Example: C:\FNET\CONF0001\DOR <- Mono and/or Xcodes C:\FNET\CONF0001\DORG <- ANSI color C:\FNET\CONF0001\DORR <- RIP BULLETIN TEXT FILE PATH & NAME Enter the path and filename of the bulletin (text file) forthis entry. The actual filename should be limited to 7 orfewer characters to permit appending a "G" or "R" to the file-name for corrosponding ANSI or RIP bulletins. Example: C:\FNET\CONF0001\BLT1 MAIN MENU TEXT FILE Enter the path and filename of the Main Menu Text File. Thisis the file users see at the Main BBS command prompt when in non-expert mode or when they enter the "?" command at the Maincommand prompt. Example: C:\FNET\MENU\MM NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. CONFERENCE MENU TEXT FILE Enter the path and filename of the Conference Menu Text File.This is the file users see at the conference command promptwhen in non-expert mode or when they enter the "?" command atthe conference command prompt. Example: C:\FNET\MENU\CM NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. FILE MENU FILE Enter the path and filename of the File Menu File. This is thefile users see at the File command prompt when in non-expert mode or when they enter the "?" command at the File Menu command prompt. Example: C:\FNET\MENU\FM NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. SCRIPT QUESTIONAIRE MENU FILE Enter the path and filename of the Script Questionaire MenuFile. This is the file users see after entering "Q" from theMain Memu to list the available questionaires to answer. Example: C:\FNET\QUES\QUES NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. PRE-LOGON DISPLAY FILE Enter the path and filename of the Pre-Logon Display File.This file is displayed at logon immediately after a userselects to use graphics mode or non-graphics mode. Example: C:\FNET\DISP\PRELOG NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. NEWS DISPLAY File Enter the path and filename of the News Display File. Thisfile is displayed at logon immediately after a user enters his/her password. It is ONLY displayed if the file date/time ismore recent that the date/time of the caller's last use of theBBS. Example: C:\FNET\DISP\NEWS NODE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. HELLO DISPLAY FILE(S) Enter the path and filename of the Welcome Text File(s). Therecan be 0-99 of these files. The names must end with the numberof the HELLO file. FeatherNet will display each file until afilename is not found. RIP Graphics and Ansi Graphics versionsmust append an "R" and "G" (respectively) to the name of thefile(s). Example: C:\FNET\DISP\HELLO1 NEWUSER DISPLAY FILE Enter the path and filename of the NEWUSER Display File. Thisfile is displayed to NEW users after they fill in theregistration questions and the new registration questionaire. Example: C:\FNET\DISP\NEWUSER NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. CLOSED DISPLAY FILE Enter the path and filename of the CLOSED Text File. This fileis displayed to NEW callers if the BBS is operated in a "CLOSED" mode. Unregistered callers will be allowed to answerthe new registration questions but once completed this filewill be displayed and the user logged off. Example: C:\FNET\DISP\CLOSED NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the filename you use must be 7 or fewer characters. CALLER LOG FILE Enter the path and filename of the CALLER log. This filecontains information about what function each user performs oror attempts to perform. Each node has its own caller log file. Example: C:\FNET\LOGS\CALLER1 EXPIRED WARNING DISPLAY FILE Enter the path and filename of the EXPIRED WARNING DisplayFile. This file is displayed at logon if the BBS is run in asubscription mode and the user's expiration is within thenumber of days specified in the modem / subscription / nodeconfiguration. Example: C:\FNET\DISP\EXPWARN NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the filename you use must be 7 or fewer characters. EXPIRED DISPLAY FILE Enter the path and filename of the EXPIRED Display File. Thisfile is displayed at logon if the BBS is run in a subscriptionmode and the user's account is expired. Example: C:\FNET\DISP\EXPIRED NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the filename you use must be 7 or fewer characters. NEWUSER SCRIPT FILENAME Enter the path and filename of the NEWUSER registration quest-ionaire. This is presented a new user after he/she completesthe BBS' new user registration edits. Example: C:\FNET\QUES\SCRIPT.0 LOGOFF DISPLAY FILE Enter the path and filename of the LOGOFF Display File. Thisfile is displayed at logoff after a user enters the [G]command to log off the system. Example: C:\FNET\DISP\BYE NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. TODAY DISPLAY FILE Enter the path and filename of the TODAY Display File. Thisfile is displayed if you have enabled the "TODAY" function. The program TODAY.EXE (or some version thereof) creates thisfile. TODAY.EXE may be run from the $$LOGON.BAT file duringlogon or during an event. If you are running your system undera "frontdoor" you may opt to run the TODAY.EXE from the batchfile you start FeatherNet with (SFN.BAT). Example: C:\FNET\DISPLAY\TODAY NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. POST DOWNLOAD WARNING DISPLAY FILE Enter the path and filename of the DOWNLOAD WARNING DisplayFile. This file is displayed when a user enters [D] to down-load a file from the file transfer command prompt. Example: C:\FNET\DISP\POSTDL NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. POST UPLOAD WARNING DISPLAY FILE Enter the path and filename of the UPLOAD WARNING DisplayFile. This file is displayed when a user enters [U] to uploada file to the BBS from file transfer command prompt. Example: C:\FNET\DISP\POSTUL NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. USER STATISTICS DISPLAY FILE Enter the path and filename of the USER STATISTICS DisplayFile. This file is displayed when a user logs onto the BBS andwhen he/she enters the [V] command from the Main BBS commandprompt. A sample is included with @Xfb macros to display useful user information to the BBS from file transfer command prompt. Example: C:\FNET\DISP\USRSTAT NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. PRIVATE MAIL ONLY Enter a "Y" if you want to allow ONLY private (EMAIL) mail tobe entered in this conference. If you specify Private MailOnly, users high message read pointers will be updated whenthey read any waiting mail in a PRIVATE mail ONLY conference. SECURITY LEVEL TO LIST BULLETINS Enter the security level (0-255) required to list bulletins. SECURITY LEVEL TO LEAVE A COMMENT Enter the security level (0-255) required to Leave a COMMENTto the Sysop. SECURITY LEVEL FOR THE [D]OOR COMMAND Enter the security level (0-255) required to use the [D]command from the Main BBS prompt to OPEN a DOOR. SECURITY LEVEL FOR THE [H]ELP COMMAND Enter the security level (0-255) required to use the [H]command from the Main, Conference and File Menu prompts toview the system HELP files. SECURITY LEVEL TO EDIT USER INFORMATION Enter the security level (0-255) required to use the [I]command from the Main Menu prompt to edit user information. ANY user with at least this security level can edit thePASSWORD, PHONE #'s and CITY/STATE fields of his/her userrecord. It is recommended you allow ONLY mature users to usethis command as it permanently alters the above fields in theuser's record in the USERS file. SECURITY LEVEL TO [J]OIN A CONFERENCE Enter the security level (0-255) required to use the [J]command to Join a Message Conference. SECURITY LEVEL TO VIEW LOGGED FILE DIRECTORY Enter the security level (0-255) required to use the [L]command from the File Menu prompt to view the currently LOGGEDfile directory listing. This is a slightly simpler method of listing a directory whenit is the last one you viewed. SECURITY LEVEL TO SEARCH FOR NEW FILES Enter the security level (0-255) required to use the [N]command from the File Transfer prompt to search for new filesfrom a specified (or given) date. SECURITY LEVEL TO USE THE [O]PERATOR PAGE COMMAND Enter the security level (0-255) required to use the [O]command from the Main Menu prompt to Page the System Operatorfor a CHAT Session. SECURITY LEVEL TO USE THE [P]AGE LENGTH COMMAND Enter the security level (0-255) required to use the [P]command from the Main Menu prompt to adjust the default screensize. SECURITY LEVEL TO USE THE [CALL] COMMAND Enter the security level (0-255) required to use the [CALL]command from the Main Menu prompt to view the CALLER log file. Discretion is recommended. SECURITY LEVEL TO USE "@" MACROS IN MESSAGES Enter the security level (0-255) required to use the "@"variables in the message conferences. Many "ECHO MAIL" networks do not allow the use of these sodiscretion is strongly recommended. SECURITY LEVEL TO READ ALL MESSAGES Enter the security level (0-255) required to use read ALLmessages and COMMENTS. It is strongly recommended that you reserve this privilege forusers you have unquestionable faith in such as a Co-Sysop orbusiness partner. SECURITY LEVEL TO EDIT OWN MESSAGES Enter the security level (0-255) required for a user to EDIThis/her OWN messages. This command can also be viewed asallowing a user to KILL a message since the entire contentsmay be discarded. Discretion Recommended. SECURITY LEVEL TO RECEIVE UNLIMITED DAILY TIME Enter the security level (0-255) required for a user toreceive unlimited daily time on the system. A user with thisprivilege has his "time on today" counter automatically resetto ZERO (0) each time he/she logs onto the system. Discretion Warranted. SECURITY LEVEL TO USE THE [Q]UESTIONAIRE COMMAND Enter the security level (0-255) required to use the [Q]command from the Main Menu prompt to answer the scriptquestionaires. SECURITY LEVEL TO [Q/QQ] QUICKSCAN MESSAGES Enter the security level (0-255) required to use the [Q/QQ]commands from the Conference prompt to perform the [Q]Quickscan and [QQ] QuickerScan of messages. SECURITY LEVEL TO [S]ET CONFERENCE SCANS Enter the security level (0-255) required to use the [S]command from the Conference prompt to SET the Conferences tobe scanned when using the [*] Global New Mail Read Command. SECURITY LEVEL TO [S] SELECT COLOR GRAPHICS Enter the security level (0-255) required to use the [S]command from the Main Menu prompt to toggle the color graphicsmode (ASCII/ANSI). SECURITY LEVEL TO [TP] CHANGE TRANSFER PROTOCOL Enter the security level (0-255) required to use the [TP]command from the Main Menu and File Transfer prompts to changethe default file transfer protocol. SECURITY LEVEL TO [V] VIEW SELECTED STATISTICS Enter the security level (0-255) required to use the [V]command from the Main Menu prompt to view selected personalstatistical information. The information displayed is in a file created by the System Operator. SECURITY LEVEL TO [V] VIEW ARCHIVES Enter the security level (0-255) required to use the [V]command from the File Transfer prompt to VIEW the file archivecontents & perform manipulations [R]ead or [D]ownload thereon.SECURITY LEVEL TO VIEW THE WELCOME FILE Enter the security level (0-255) required to use the [W]command from the Main Menu prompt to view the Welcome file. SECURITY LEVEL TO USE TOGGLE EXPERT MODE Enter the security level (0-255) required to use the [X]command to Toggle Expert mode ON/OFF. SECURITY LEVEL FOR [Z]IPPY DIRECTORY SEARCH Enter the security level (0-255) required to use the [Z]Zippy File directory search to locate any text within the filedescriptions. SECURITY LEVEL TO USE [*] GLOBAL NEW MESSAGE READ Enter the security level (0-255) required to use the [*]command from the Conference or Main Menu prompts to perform aGLOBAL new message read scan. SECURITY LEVEL TO USE BBS [VER]SION COMMAND Enter the security level (0-255) required to use the [VER]command from the Main Menu prompt to list the BBS Versioninformation. SECURITY LEVEL TO KILL ANY MESSAGE Enter the security level (0-255) required to KILL any messagein any conference on the system. A user with this securitylevel may also: o Execute a DOS command. o Edit his/her Security Level field by using the [I] command from the Main BBS Prompt. o Change the [S]tatus of any message to/from PUBLIC and RECEIVER ONLY. o Enter Messages to a SPECIFIC Security Level (@###@) or a range of Security Levels (@##-##@). Allow ONLY a Co-Sysop or VERY CLOSE Associate to use thiscommand. SECURITY LEVEL TO EDIT ANY MESSAGE Enter the security level (0-255) required to EDIT any messagehe/she reads. This is another VERY Powerful command and muchdiscretion is warranted. Allow ONLY a Co-Sysop or VERY Close Associate to use thiscommand. FORCE USERS INTO BULLETIN MENU AT LOGON Enter "Y" to force "ALL" users into the bulletin menu at logonif new or updated bulletins are present since the caller'slast logon. MINUTES PRIOR TO EVENT TO DISALLOW CALLERS Enter the number of minutes prior to the scheduled event timeyou want to disallow all callers. It is possible for callersto be involved in a file transfer and cause the BBS to miss ascheduled event. LOCATION OF USER INDEX FILES Enter the DOS path to where the User Index files (PCBNDX.x)are located. Enter ONLY the subdirectory where these fileswill be located. Example: C:\FNET\USERNDX\ LOCATION AND FILENAME OF CONFERENCE JOIN MENU Enter the path and filename of the file to be displayed tousers when the [J] command is invoked to JOIN a conference.You can maintain ASCII and ANSI versions of this file. You mayuse security level specific menus if desired. No fileextension is allowed. Examples: C:\FNET\MENU\CM and C:\FNET\MENU\CM40 In the first example a file called "CM" is the Join Menu. In the 2nd example a file called "CM40" is the Join Menu forsecurity level 40 ONLY users. NOTE: In both examples, the ANSI or RIP graphics version of these files (if used) must have a "G" or "R" appended to the filenames. Thus, the maximum length of the file- name you use must be 7 or fewer characters. LOCATION OF "HELP" FILES Enter the sub-directory the "HELP" files will be kept in. Thefiles in this directory are the .HLP files FeatherNet displaysfor [H]elp command. This directory is also for "special" help files the SYSOPcreates for additional help. The users may read these byentering "H <filename>" from the Main Menu command prompt.The SYSOP should notify users of these files by Bulletin,News, Hello files or menus. This additional help function isONLY usable from the Main Menu command prompt. Example: C:\FNET\HELP\ LOCATION AND FILENAME OF COSYSOP BITMAP FILE Enter the path and name of the CoSysop BITMAP file. This filewould generally be located in the BBS home directory. It isconceivable that a Sysop might want to have different Confer-ence configurations for different nodes. The CoSysop BITMAP's are used to specify which users may beCo-Sysops in a given Conference. If designated as a Co-Sysopfor a given conference the user may do the following in thatconference: Read ANY Messages KILL ANY Messages Example: C:\FNET\FNSYS\COSYSOP.BIT HAVE THE "DO YOU WANT COLOR' QUESTION DEFAULT TO "Y" OR "N" Enter a "Y" if you want the "Do you want Color Graphics"question at login to default to (Y)es. Enter an "N" to have itdefault to (N)o. RINGS BEFORE FEATHERNET ANSWERS A CALL Enter the number of rings (1 - 10) you want before FeatherNetsends the answer command to the modem. Typically, one (1) ringis preferred but some Sysops may want to wait for additionalrings. PATH AND FILENAME OF "PWRD" FILE Enter the complete path and filename of the PWRD file to usein this configuration. The PWRD file determines the amount of time per day a user gets based on his/her security level. The format for this file is in the documentation and a sample"PWRD" file is included with the BBS package. Example: C:\FNET\FNSYS\PWRD SECURITY LEVEL Enter a Security Level to configure file ratios for. FeatherNet searhes search for the security level of the user at logon. If a "match" is found, the user is assigned thespecified time, k-byte, batch transfer limits, ratios, etc asspecified for the "matched" security level. Note that only oneentry per possible security level (0-255) should be entered asFeatherNet does not continue searching after a "match". FILENAME EXTENSION NOT PERMITTED This file can not have an extension. Its name must be 7 orfewer characters as FeatherNet will add a "G" to the name whensearching for the color graphics version of the file. Additionally, if this file is to have security level specificversions the file name *must* be 4 or fewer characters to allow for a "G" added to the graphic version by FeatherNet andthree characters available for the security level (0 - 255). PRE-LOAD FNETTEXT FILE Pre-Loading the FNETTEXT file provides increased efficeincywhen the FNETTEXT file is accessed to display various textstrings such as command prompts. This would also help reducewear on your hard drive since the drive is not accessed forthe various text strings. The only possible drawback is thatapproximately 21K of DOS memory is required to pre-load theFNETTEXT file. If you are running FeatherNet with less than 50k memory (51.2Kbytes) available when waiting for a call, you would probably be wise to leave this option set to "N". If you have sufficient memory, it is strongly recommended you enable the pre-loading of the FNETTEXT file by answering "Y". CONFIRM LOGOFF COMMAND Enter "Y" if you wish callers to confirm a logoff when the[G]oodbye command is entered. The default answer is (N)o. CONFERENCE INTRO FILE Enter the full path and filename of the conference Intro file.The conference "Intro" file is displayed each and every time auser [J]oins a conference. This file is not required and isoffered as a configuration option to assist users in under-standing what is available in the specific conference joined. Each conference may have a unique "Intro" file. The filenameshould be 7 or fewer characters to allow the adding of the "G"(ANSI) or "R" (RIP) as the last character of the filename. Example: C:\FNET\CF0001\INTRO PUBLIC MAIL ONLY Enter a "Y" if you want to allow "ONLY" PUBLIC mail to beentered in this conference. If you specify PUBLIC mail only,you might consider advising users this conference permits"ONLY" public mail (readable by anyone w/ conference access). ATTACH FILE TO MESSAGE SECURITY LEVEL Enter the security level required to "ATTACH" a file to amessage. The user can upload a file which will be placed inthe conference's ATTACHMENT directory (if configured to allowfile attachments in the conference). Level must be (0-255). Allowing file attachments is an excellent way to permit repet-itious uploading of the same file while preserving each fileby uniquely renaming it (troubleshooting/developing). DOWNSIDE: Users could potentially utilize the function to carry on illegal uploading & downloading of software. Monitor its use on your system closely. THIS CONFERENCE'S ATTACHMENT DIRECTORY Enter the directory path where you want File Attachments tomessages in this conference to be placed after uploading.Leaving this BLANK disables file attachments for this conf. Example: C:\FNET\CF0000\ATTACH SLOW DRIVE LETTERS Enter the letter(s) of any SLOW storage devices such as net-work servers, CD-Roms or multi-disk cd roms. "NOP" could be entered to indicate that files found on drive N, O or P shouldbe copied to the "work directory" on a hard drive or ram diskprior to performing the file transfer. Example: NOP IS THIS EVENT ACTIVE Enter "Y" or "N" to specify if this is an ACTIVE EVENT or not.An active event means one which you want to be executed whenthe correct date & time arrive. EVENT MODE FeatherNet has two modes by which events may be controlled,(E]xpedited and (S)liding. An EXPEDITED event forces callers off and denies access to thesystem doing everything possible to ensure the event will berun at the specified time. If the event does not run at thespecified time or in the time "Window" specified in the eventconfiguration, it will be skipped. A SLIDING event is one which will be run during the specifiedtime "window". Users will not be interrupted and users' timeallowed will not be affected. Whenever a user logs off thesystem during the time "window" the event will be executed.This may well be the preferred manner of running daily eventssuch as mail runs or system maintenance. Enter an "E" to specify an EXPEDITED event or an "S"to specify a SLIDING event. EVENT BATCH FILE Enter the event batch filename. This file will be copied toEVENT.BAT by FeatherNet. Ensure you *do* have the ".BAT" fileextension on each event's batch file. Example: MAILRUN BEGIN TIME Enter the time the event is scheduled to run. All attemptswill be made to run events at this time. The time must bespecified as HH:MM in military format. Examples: 02:00, 14:30, 23:45, 00:30 EVENT END TIME Enter the END time for this event. This is the LATEST any attempt will be made to run the event each time it is pending.The period from the begin time to the end time is the "window"in which FeatherNet will attempt to run the event. The timemust be specified as HH:MM in military format. Examples: 02:00, 14:30, 23:45, 00:30 EVENT DATE Enter a specific DATE this event is to be run. If it is to berun daily leave this field blank. Dates *must* be entered inthe MM-DD-YY format. A date may contain wildcards which are"00" in a month (MM) or year (YY) position. Examples: 00-01-00, 12-25-00, etc. NOTE: In the first example date, an event would be run on the first day of every month while in the second example an event will be run every CHRISTMAS. LAST EVENT DATE This is a field which FeatherNet updates to record when anevent is run. An event will only be run once on the day it isdue. You would have to BLANK this field to have FeatherNet runthe same event at a later time on a given day. If you DO alter this field in order to force an event to berun again (or for some other reason), ensure you enter thedate (if you do not leave the field blank) in the MM-DD-YYformat. Examples: 01-01-93, 12-25-93, 00-01-00, etc. EVENT DAY FLAGS Enter a "Y" or "N" to tell FeatherNet the days you want anevent executed. The days are specified as SUNDAY through SATURDAY. SMTWTFS ┌──────────────┐ │IMPORTANT NOTE│ └──────────────┘ When you enter a specific date ( with or without wildcards("00"), the DAY flags are ignored & the DATE field determineson which day an event will be run. It is *very* important toleave the DATE field blank if you have an event you want to berun more often than once a month. TAKE THE MODEM OFF-HOOK WHEN AN EVENT IS PENDING Enter "Y" if you want the modem taken off-hook (BUSY) whenactivity is suspended due to an upcoming event. The number ofminutes specified above determine how long the modem will beoff-hook if the event Begin Time has not been reached. Taking the modem off-hook will prevent callers from possiblythinking there is a problem with the system since the phone is"Ringing Off the Hook" with no answer. SERIAL PORT BASE ADDRESS Enter the serial port address to use. If you will be using the"STANDARD" Port Address for COM Port 1 or 2 then you can skipthis question. Examples: &H3F8 (for COM3) &H2F8 (for COM2) SERIAL PORT IRQ NUMBER Enter the IRQ number to use. If you will be using a "STANDARD"IRQ for COM Port 1 or 2 then you can skip this question. Examples: &H4 (for COM3) &H3 (for COM4) You can use any IRQ numbered 1 thru 7 on XT class machines andIRQ numbers 1 thru 15 on AT and above class machines providedthe IRQ is not SHARED by another device. Each serial port MUSTuse a unique IRQ. NOTE: A Cold Boot is imminent if you specify an IRQ number which cannot be used. LOCATION OF SCRIPT QUESTIONAIRES Enter the location of the script questionaires. This is whereFeatherNet will look for the script questions you create toask your users when they enter [Q] from the Main Menu. Example: C:\FNET\QUES\ OPERATE AS A CLOSED SYSTEM Enter "Y" if you wish to operate your system in a CLOSED mode.This will prevent anyone from logging on as a new user. Youwill have to manually "Add" each new user into the USERS filewith FNETSM. New callers will be allowed to answer the new user scriptquestionaire (if it is available) and will be immediatelylogged off upon completing the questions. USE REAL NAME Y = If the SysOp logs into a system using the SysOp In - Busy or Local In - Busy options, any messages left, comments made, or screens displayed use information contained in record one of the USERS file. N = When the SysOp logs into the system, any messages left, comments made, or screens displayed use the SysOp Name specified above rather than information contained in record one of the USERS file. CO-SYSOP'S NAME Enter the name of the Co-SysOp for this conference. The sign-ificance of the name is all mail addressed to "SYSOP" will beautomatically addressed to this Co-SysOp name. A person chosen as the Co-SysOp for this conference MUST havehis or her Co-SysOp bit flag for this conference turned on inFNETSM or by using the internal user editor ([I] from the MainMenu command area). Leaving this item BLANK disables the re-addressing of any mailfrom the SysOp to the Co-SysOp. TIME ALLOWED ON SYSTEM Enter the number of minutes a caller whose security levelmatches the level entered on the current line will be allowedon the system each day. A caller whose security level equals or exceeds that which isspecified for unlimited daily time (Security Level Configura-tion) is not limited to any amount of Time per Day. The timelimit for such a user is per session. MAXIMUM K-BYTES TO DOWNLOAD TODAY Enter the maximum number of KiloBytes (1024 bytes) that youwish to allow a caller with the specified security level to belimited to on a daily basis. These bytes are available provided the user has "NOT" reached/exceeded the specified file or byte ratio requirements forthis security level. PARALLEL PORT TO USE Enter the parallel port to send the Caller Log entries to. Ifa port (1-3) is specified and the "Printer" option on the CW(Call Waiting) screen is toggled "Yes" (or with the <Alt-P> keys combination from within the BBS) caller log entries willbe sent to the printer in the same manner in which they aresaved to the CALLER log file. Entering a "0" will disable output to the printer. Each nodeconfigured has its own printer control. If you have no printerattached to the system and powered up, ensure this option is set to "0". PATH & NAME OF USERS' INFORMATION FILE Enter the path and name for the USERS' information file. Thisfile contains hourly subscription information for each user &additional personal data both the user and SysOp enter. Example: C:\FNET\FNSYS\FNUSERS.INF USE GRAPHICS QUOTING FEATURE Y = Use the graphics "box" to display newly quoted txt in the message editor. N = Use the Initials of the person the message is TO followed by the ">" character. Why use this: It looks nice. Why NOT use this: Some echo mail networks such as FIDO do not permit the use of a graphics type quoting feature as it does add extra data to each quoted message. This ultimately results in greater cost and longer transmission times to send and receive the messages throughout the network. PROHIBITED WORDS WARNING FILE Enter the path and filename of a file to be displayed to a user when a "Prohibited Word" is used when entering a message.This file is used "ONLY" if the affected conference has a"Prohibited Words" data file defined (conference configurationeditor). NOTE: This file should not have a file extension as it may be an ASCII, ANSI or RIP file. PROHIBITED WORDS DATA FILE Enter the path and filename of the "Prohibited Words" datafile. Specify this file "ONLY" if you want the words in thedata file to cause a warning file to be sent to the user. Ifthis file exists and a user has used a "Prohibited Word" in amessage, the message will not be saved. An entry is made inthe caller log file. This is a straight ASCII text file with one word on each lineof the file followed by a cr/lf combination. ALLOW ALIASES IN THIS CONFERENCE Y = Allow users to user "aliases" within this conference. If aliases are allowed, messages will be addressed as from the users AliasName (configured with the [I] command from the Main Menu command prompt). If a user enters a message in a conference which allows aliases and he/she has no AliasName on file, this the user's real name will be used in the From field. N = Do not allow aliases to be used in this conference. Most echo mail networkd *do not* allow aliases. STANDARD BAUD RATE FeatherNet allows you to specify a "Standard" baud rate whichwill be used to re-calculate the daily K-Byte download limit.You should only use an anticipated CONNECT baud rate such as300,1200,2400,4800,9600,14400,19200 etc. If you do not wish touse this feature, it is disabled by placing a zero (0) in thefield. If the "Standard" baud rate is 2400 and a caller logs on at9600 baud, his daily k-bytes will be adjusted to 4 times thevalue specified for the security level. (9600 ÷ 2400 = 4). Ifthe "standard" baud rate is 9600 and a caller logs on at 2400baud, his daily k-bytes will be adjusted to 1/4 the valuespecified for the security level. (2400 ÷ 9600 = 1/4). BATCH FILE TRANSFER LIMIT Enter the maximum number of files a user with the specifiedsecurity level may upload or download at one time utilizingthe "Batch" method. This value may be from 1 TO 99. FILE DOWNLOAD RATIO Enter the maximum download to upload FILE ratio to be permit-ted for this security level. FeatherNet monitors the fileratio continuously and users are not permitted to exceed themaximum ratio at any time. Entering a value of 7.5 here would allow users with thissecurity level to download up to 7.5 files for every fileuploaded. If 75 files were downloaded and 10 files had beenuploaded, the user would be at the maximum allowed file ratio.No more downloads could occur until at least one more file wasuploaded to the system. BYTE DOWNLOAD RATIO Enter the maximum download to upload BYTE ratio to be permit- ted for this security level. FeatherNet monitors the byte ratio continuously and users are not permitted to exceed the maximum ratio at any time. Entering a value of 7.5 here would allow users with this security level to download up to 7.5 bytes for every byte uploaded. If 750,000 bytes were downloaded and 100,000 bytes had been uploaded, the user would be at the maximum allowed byte ratio. No more downloads could occur until at least enough bytes to decrease the byte ratio have been uploaded to the system. FILE DOWNLOAD LIMIT Enter the maximum number of files allowed to be downloadedfrom the system. If this number is reached, FeatherNet suspends downloading for the user until such time the SysOpadjusts the users download counter or increases the downloadlimit. K-BYTE DOWNLOAD LIMIT Enter the maximum number of K-bytes allowed to be downloadedfrom the system. If this number is reached, FeatherNet suspends downloading for the user until such time the SysOpadjusts the users download counter or increases the downloadlimit. FILE CREDITS You can allow new users to download files prior to uploadingany by specifying an initial upload credit. This value is usedby FeatherNet to imply "files uploaded". It is added to all users' files uploaded counter when calculating the download toupload file ratio. Setting this value at 5 would allow a user to download 50files before a 10.0:1 file ratio was attained. K-BYTE CREDITS You can allow new users to download files prior to uploadingany by specifying an initial upload k-byte credit. This valueis used by FeatherNet to imply "k-bytes uploaded". It is addedto all users' k-bytes uploaded counter when calculating thedownload to upload byte ratio. Setting this value at 100 would allow a user to download 1000k-bytes (1 megabyte) before a 10.0:1 byte ratio was attained. QUOTE TEXT FILE Enter the path and filename of the file which contains QUOTESto be displayed to users when they logon. The file must beformatted as: # of Quotes in File Quote text Quote text <BLANK LINE> The BLANK line is the "terminator" marking the end of theQuote. Example: C:\FNET\DISP\QUOTES.BBS DISPLAY USER STAT FILE AT LOGIN Y = Display the USRSTAT file at login. N = Do not display the USTAT file at logon. The file may be viewed from the Main Menu command prompt byentering [V] is security level is sufficient. POST UPLOAD DISPLAY FILE Enter the path and filename of a file to display after asuccessful upload. Example: C:\FNET\DISP\POSTUP FAILED UPLOAD DISPLAY FILE Enter the path and filename of a file to display after anunsuccessful upload. Example: C:\FNET\DISP\FAILUP POST DOWNLOAD DISPLAY FILE Enter the path and filename of a file to display after asuccessful download. Example: C:\FNET\DISP\POSTDN FAILED DOWNLOAD DISPLAY FILE Enter the path and filename of a file to display after anunsuccessful download. Example: C:\FNET\DISP\FAILDN RIPSCRIP SUPPORTED BY DOOR Y = This door directly supports RIPscript graphics. N = This door does not directly supports RIPscript graphics. GROUP CHAT MENU Enter the path and filename of the menu to be displayed when auser selects the Group Chat function. This file may be ASCII,ANSI or RIP so the filename must be kept to 4 or fewerchatacters to allow for the security level of the caller to beadded in case you want some security level specific Group ChatMenus. Example: C:\FNET\MENU\CHATM DIRECTORY FOR CHAT FILES Enter the path to the chat related files. This path is wherethe chat data files will be created by FeatherNet. Example: C:\FNET\CHAT\ NUMBER OF CHAT ROOMS Enter the number of group chat "ROOMS" to be available. A "Room" can be though of as where a specific topic might beopen for discussion. The maximum number of rooms is 255. USE HOURLY SUBSCRIPTION Y = Users with this security level will be paying by the hour. You will need to use FNETSM to set the hourly cost and enter and monies received. N = Users with this security level will not be paying by the hour. CONFIRM USER'S NAME & ADDRESS Normally, FeatherNet will stop searching for a user name assoon as it is found in the user index files. This user'spassword would be required to enter the system under the loginname. Since this could easily be a problem when two or moreusers have the same name, set this option to "Y" to confirmthe name at logon and when addressing a message. SYSOP'S MAIN MENU TEXT FILE Enter the path and filename of the Main Menu Text File. Thisis the file users see at the Main Menu command prompt when innon-expert mode or when they enter the "?" command at the MainMenu command prompt. Example: C:\FNET\MENU\MMS NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. SYSOP'S CONFERENCE MENU TEXT FILE Enter the path/name of the Conference Menu Text File. This isthe file users see at the conference command prompt when innon-expert mode or when they enter the "?" command at theconference command prompt. Example: C:\FNET\MENU\CMS NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. SYSOP'S FILE TRANSFER MENU TEXT FILE Enter the path/name of the File Transfer Menu Text File. Thisis the file users see at the File Transfer command prompt whenin non-expert mode or when they enter the "?" command at theFile Transfer command prompt. Example: C:\FNET\MENU\FMS NOTE: The ANSI or RIP graphics version of this file (if used) must have a "G" or "R" (respectively) appended to the filename. Thus, the maximum length of the file name you use must be 7 or fewer characters. FORCE USERS TO READ NEW PERSONAL MAIL AT DURING LOGON Y = Force users to read new personal mail when a mail waiting flag is set. This will occur during the LOGON process. N = Allow users to choose to read new personal mail when a mail flag is set. They will be queried during the LOGON process. PATH AND FILENAME OF FNCONF.@@@ Enter the path and filename of the FNCONF.@@@ file. Nodes canshare this file if desired. It must be flagged as READ only tobe used by more than one node. Example: C:\FNET\FNSYS\FNCONF.@@@ PATH AND FILENAME OF CONFERENCE NAMES LISTING FILE Enter the path and filename of the FNCONF.LST file. This is astraight ASCII text file created by FNCFG to facilitatequickly determining if a NAME entered for a conference to joinis that of a conference the user is allowed to join. Example: C:\FNET\FNSYS\FNCONF.LST PATH AND FILENAME OF USERS FILE Enter the path and filename of the USERS File. The file "MUST"be in the same location for ALL nodes. You should leave itin the "\FNSYS" sub-directory unless something unique aboutyour system requires it to be located elsewhere. Example: C:\FNET\FNSYS\USERS PATH AND FILENAME OF FNEXTUSR FILE Enter the path and name of the FNEXTUSR File. The file "MUST"be in the same location for ALL nodes. You should leave it inthe "\FNSYS" sub-directory unless something unique about yoursystem requires it to be located elsewhere. FNEXTUSR is usedwhen more than 40 conferences are configured. It is maintainedby FNCFG and the FeatherNet MAIN executable (FNET.EXE). Example: C:\FNET\FNSYS\FNEXTUSR MAXIMUM NUMBER OF MESSAGES LINES IN MESSAGE EDITOR Enter the maximum number of message lines allowed in themessage editor. NUMBER OF MINUTES FOR LOCAL KEYBOARD TIMEOUT Enter the maximum number of minutes for the "LOCAL" keyboardtimeout. This will NOT affect the caller. PATH AND FILENAME OF FNETPROT.DAT FILE Enter the path and name of the FNETPROT.DAT File. The filemay be shared by ALL nodes. You should leave it in the"\FNSYS" sub-directory unless something unique about yoursystem requires it to be located elsewhere. FNETPROT.DATcontains information FeatherNet uses for file tranfer protocolimplementation. Its structure and detailed description are inthe documentation. Example: C:\FNET\FNSYS\FNETPROT.DAT SERIAL DRIVER SELECTION Enter the serial driver mode you desire to use. Selectionsavailable are (A) ASYNC and (F) FOSSIL. Normally ASYNC will be selected. FOSSIL could be selected insituations where an ASYNC driver might have problems such asunder a software multitasker such as DESQview. RETURN RECEIPT SECURITY LEVEL Enter the security level (0 - 255) required to request aRETURN RECEIPT when saving a message in this conference. Alevel of "0" disables the function in this conference. QUICK LOGON SECURITY LEVEL Enter the security level (0 - 255) required to utilize aQUICK LOGON method. Users with this security level (or greater) may enter a "*"followed by the name/password when "logging on" the system andbypass the following files being displayed: HELLO, NEWS, QUOTE, USRSTAT and the "TODAY" file (if enabled).Additionally, the $$LOGON.BAT will not be run. LOCATION OF "FREE" DOWNLOAD FILES Enter the sub-directory name in which all "FREE" downloadfiles will be located. "FREE" downloads are those files which users may download andNOT be charged for BYTES or FILES. Download time for "FREE"files may be controlled in the next configuration option. Example: C:\FNET\FILES\FREE\ STOP THE CLOCK FOR "FREE" DOWNLOADS Enter an "N" if you want to charge users for the TIME usedwhen downloading "FREE" files. Enter a "Y" to STOP the clockwhen downloading "FREE" files. Note that ONLY the calculated time for a "FREE" download iscredited (thus STOPPING the clock). Any additional time spentdownloading "FREE" files is charged against the user's dailytime allowance. If the time used in a "FREE" download sequence is less thanthe calculated time, only the time used for the download iscredited. PATH AND FILENAME OF TRASH FILE Enter the path and name of the TRASH File. The file shouldbe in the same location for ALL nodes. You should leave it inthe "\FNSYS" sub-directory unless something unique about yoursystem requires it to be located elsewhere. The file containsnames "LOCKED OUT" of the system. Example: C:\FNET\FNSYS\TRASH