home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Shareware BBS: 2 BBS
/
02-BBS.zip
/
vdocs.zip
/
VC2F
< prev
next >
Wrap
Text File
|
1993-12-16
|
30KB
|
614 lines
.TOPIC:
Paths Configuration
VBBS 6.12 Documentation -- 2-F-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX F 4. PATHS CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
This is the section of VCONFIG in which you can configure
and optimize VBBS' use of your hard-drive space.
1) Main VBBS Directory (\VBBS)
═══════════════════
The system executables (*.EXE) belong in this directory,
along with WFC.COM and your configuration (*.CFG) files.
This should be your current directory when you are exe-
cuting the program. A typical path might be
C:\VBBS
2) Scripts Directory (\V)
═════════════════
This is where VBBS expects to find any script and func-
tion-block files:
*.V *.COD *.LIT *.FB
3) Data Directory (\DATA)
══════════════
Where VBBS expects to find system data files:
USERFILE.DAT CONNECT .DAT NET.1 ... NET.999
USERFILE.IDX AREACODE.NET
STATVBBS.DAT NETWORKS.LST
4) System Text Files (\TXT)
═════════════════
Where VBBS expects to find system text files:
*.TXT *.ANS *.ASC *.MNU *.PDM *.RIP
Note that many online-game programs generate score files
that may be placed in this directory and viewed using the
[B]ulletins option from the Main Menu.
5) CONTROL.DAT Directory
═════════════════════
Specifies in which directory VBBS will maintain the tem-
porary system file containing the current user's informa-
tion. Multi-user installations NEED to set up a RAMdrive
for this file; the same is also *recommended* for single-
line installations (see "Optimizing VBBS" for details on
setting up a RAMdrive).
6) Temporary Directory (\TEMP)
═══════════════════
This is the directory VBBS will use for temporary storage
of incoming network packets and files. The directory you
specify here should not be used for any other purpose,
VBBS 6.12 Documentation -- 2-F-2
and it is NOT recommended that you use a RAMdrive for this
directory (if the power goes, you could lose an entire net
packet).
7) Database Directory (\DB)
══════════════════
This is the directory where VBBS will store ALL database
information, such as messages and file descriptions.
8) Upload/E-Mail Directory (\SYSOP)
═══════════════════════
Specifies path for storage of E-mail with attached files
and uploads from users (if you have all uploads going to
the \SYSOP directory). For tighter security, you may want
to place the \SYSOP directory directly off of your DOS
root directory.
--> IMPORTANT NOTE: You may specify whatever paths you wish for
these directories (and will need to for di-
rectories you wish to place in a RAMdrive),
but it is much less confusing to use the
default paths set up by the INSTALL.EXE
program. It is recommended that you run the
system diagnostics anytime you alter any
settings in this section of VCONFIG to verify
that they are correct.
.TOPIC:
Download/Upload Protocols
VBBS 6.12 Documentation -- 2-G-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX G DOWNLOAD/UPLOAD PROTOCOLS ║
╚════════════════════════════════════════════════════════════════╝
PROTOCOLS are the means by which files are transferred to
and from your system. The original protocol was XModem, devel-
oped by Ward Christensen; there are many more to choose from now.
VBBS comes "out of the package" preconfigured to handle XModem,
YModem, ZModem, ZModem-Batch, and HS-Link protocols and it own
proprietary VXY protocol. Other protocols may added at your
discretion. Each protocol is configurable by:
1) Which letter the user will press to select that protocol
2) The name and description of the protocol
3) DOS command line to run protocol. Parameters passed are
%1 COM port
%2 baud rate
%3 filename
%4 handshake
%5 UART rate
%6 port base
%7 port IRQ
%8 channel number
%9 upload directory
4) Batch compatible? (Y/N)
For most installations, the preconfigured protocols will
be more than sufficient; should you wish to add other protocols,
consult the protocol documentation for information on construc-
ting the proper command line.
--> IMPORTANT NOTE: It is HIGHLY recommended that you use the
FULL path when you specify the filename of
your transfer protocols; these programs are
notorious for their pickiness in this re-
gard. For example, with ZModem, you might
use the following command line to set it up
to receive files (upload protocol):
C:\VBBS\DSZ port %1 ha %4 restrict rz
.TOPIC:
Networks Configuration
VBBS 6.12 Documentation -- 2-H-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX H 7. NETWORKS CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
Selecting this option brings you to a list of networks,
which is derived from NETWORKS.LST, a master multi-net listing.
NETWORKS.LST is updated periodically as needed and should be placed
in your /DATA subdirectory.
--> IMPORTANT NOTE: The NETWORKS.LST file is configureable
by the sysop.
What happens after you get to the first screen of the NETWORK
Configuration depends on what type of network you're configu-
ring.
Type 1 Networks (VirtualNET-Type)
═════════════════════════════════
When you select this type of network, you will be prompted
for the following information:
1) Node Number Your system's unique assigned network ad-
dress, expressed as a number (e.g., 2056).
2) Net Directory The network directory to be used by this
VNET-based network; each network you set
up must have its own UNIQUE directory.
3) Protocols Allowed Options are Zmodem, Ymodem, HSlink, and
VXY protocols
4) Protocol Prefer. Protocol that will be used when your
system initiates network transfers.
5) Server Your server's node number.
6) Server Phone # Your server's phone number.
7) Server Call Whether call to server is LOCAL or LONG
DISTANCE.
8) Server Threshold Number of kilobytes that must be pending
before automatic callouts to a server are
allowed. Between the Server Call and
Server Threshold settings, VBBS deter-
mines if and when to call out to your
server for a network transfer. If your
server is LOCAL, the system will call
whenever the threshold is met or excee-
ded; if LONG DISTANCE, the system will
call, once per day, between the hours of
11:00 p.m. and 6:00 a.m. if the threshold
is met or exceeded.
9) Server Macro "Macro" file needed to log onto the ser-
ver's BBS, if any. Most of the time this
is not needed, and can be left at <none>.
A) Server Password Network server's password (if used).
B) ZIP Trigger Level Default 50k for prezipping packets before
initiating network callout.
VBBS 6.12 Documentation -- 2-H-2
C) Add/Edit/List Used only if your system functions as the
Clients server for other systems. More on this
in a moment -- I can only indent so far.
E. Edit Extended Permits you to designate up to four
Connections different VirtualNET servers to connect
to.
U) Uninstall This Allows you to drop participation in a net-
Network work. VBBS will prompt for confirmation.
If your system functions as server for one or more other systems,
you need to configure each client separately using the C) option
above. When you select this option, you get a screen prompting
for the following information:
1) Client Node Number 6) Client Password
2) Client Phone Number 7) Client Protocol
3) Client Call 8) Client Compression
4) Client Threshold
5) Client Macro D) Delete This Client
These data fields function exactly as do the "server" fields de-
scribed above.
If your system will connect to more than one VirtualNET server,
selecting option E) Edit Extended Connections will bring up the
following menu:
1. Node Number:
2. Phone #:
3. Call:
4. Threshold:
5. Macro:
6. Password:
To use extended connects you must set up an EXTEND.0 file
in your NET subdirectory. Please see VirtualNet helpd.
Type 2 Networks (WWIVnet-type)
══════════════════════════════
When you select this type of network, you will be promp-
ted for the following information:
1) Node Number Your WWIVnet node number.
2) Data Directory The FULL path to your WWIV \DATA direc-
tory.
3) Mode This is either NET (for WWIVnet-style
networks) or LINK (for WWIVLink-style
networks).
4) EXE Directory The directory containing the WWIV and
VWW4 executable files.
5) Dialout Init Your modem's init string for calling
String WWIV systems.
VBBS 6.12 Documentation -- 2-H-3
Type 3 Networks (UUCP-type)
═══════════════════════════
When you select this type of network, you'll be prompted
for the following information:
1) System Name Your UUCP system address.
2) News Directory Full path to your NEWS directory (for
newsgroup usage).
3) User Directory Full path to your USER directory (for
E-mail usage).
Type 4 Networks (FIDO-type)
═══════════════════════════
When you choose this type of network, you'll be prompted
for the following information:
1) Fido Address Your FIDOnet address in standard format.
2) NetMail Directory Full path to the directory into which
incoming FIDOnet packets will be placed.
3) OutBound Direc- Full path to the directory in which out-
tory going net packets are stored.
4) Archiver FIDO archiver to use (e.g., PKZIP -U).
5) UnArchiver FIDO unarchiver to use (PKUNZIP, etc.).
6) FIDO Front-End This can be FRONTDOOR, BINKLEY, or STAND-
ALONE (the default).
7) Nodelist: Name of the NODELIST
8) Zones: Options are 1-8
D) Dial List Allows editing of your dialing list.
R) Routing Specifies mail routing.
A) AKA's Allows for other Fido-type networks
In each case, you may select [U] to uninstall the network; you
will be prompted for confirmation. For more information on the
various networks available, see MULTINET.DOC and NETGUIDE.DOC,
as well as the documentation for the various network interface
softwares (see below).
--> IMPORTANT NOTE: In order to install networks of Types 2,
3, or 4, you will need the proper network
interface software (VWW4.EXE, VUUCP.EXE,
or VFIDO.EXE, respectively). These
programs are freely available to sysops.
You should also set up your VirtualNET
entry for mail tossing to work properly.
.TOPIC:
Events Configuration
VBBS 6.12 Documentation -- 2-I-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX I 8. EVENTS CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
VBBS allows up to 20 timed events per day. Possibilities
for these events include your daily external maintenance routine
(usually done through a batch file or three), network dialouts,
online game maintenance, etc.
1) Time
════
The time the event is to run, entered in HH:MM format
using military time. A time of 00:00 disables the event.
2) Command Line
════════════
The DOS command line or batch file to execute. For exam-
ple, you might enter
C:\VBBS\EXTERNAL.BAT
for an external daily-cleanup routine. Complete pathnames
are not required if the routines are located in your main
VBBS directory, but it's better to make sure.
There are a number of external utilities specifically designed
for use with VBBS; they are listed in APPENDIX K. For online-game
maintenance, please consult the game documentation.
.TOPIC:
Control Panel Configuration
VBBS 6.12 Documentation -- 2-J-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX J 9. CONTROL PANEL CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
In addition to the commands already configured in the WFC
menu, VBBS allows you to assign the F1 through F10 keys for what-
ever functions you desire.
╔═╗ If you find yourself continually dropping to DOS to run
╚═╝ the same program over and over, it's probably a good idea
to assign a function key to handle it.
The default VBBS setup suggests some possibilities for using the
F-keys. F1 through F4 come preconfigured, but that's easy to
change if you so desire.
F1 Looks for a batch file called TERMINAL.BAT, which you
must create using an ASCII text editor. This batch file
contains the command line that will start up your communi-
cations program (Telix, etc.). Hereis an example of
a command line:
C:\VBBS\TELIX.BAT
and put TELIX.BAT in the main VBBS directory.
F2 Calls up the system log, where information about the day's
callers and what they did is located. Viewing the log
requires the DOS command line
TYPE C:\VBBS\DATA\BBS.LOG | MORE
(your actual path may vary, depending on what you've set
up in the PATHS configuration) or an external text-brow-
sing utility, such as VLIST.EXE. Note that the DOS com-
mand line above does not allow you to back up through
the text, use arrow keys, or PgUp/PgDown; We recommend
using VLIST.EXE or LIST.COM.
F3 Same as F2, but brings up the network log (the filename
is NETWORK.LOG and should be in your \DATA directory).
F4 Same as F2, but brings up the cumulative system statistics
(the filename is DAYSTATS.LOG and should be in your \DATA
directory). This one is particularly useful for tracking
usage cycles and upload/download trends.
Other potential uses for the F-keys include invoking a
shell program (such as DCOM or StereoShell), a text editor (the
DOS 6.0 editor or similar), or other programs you frequently run
outside of VBBS. Be aware that several add-on utilities have
been specifically developed for VBBS to call up sub-menus from
F-keys so that maximum flexibility is available to you.
--> IMPORTANT NOTE : Place all batch files to call up
function keys in your main VBBS
directory.
.TOPIC:
Doors Configuration
VBBS 6.12 Documentation -- 2-K-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX K A. DOORS CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
VBBS will run almost all modern doors and online games
created for use on BBSes, either straight from the command line
or through the use of an external door converter, such as DOORWAY
or DoorMaster. Doors can be called from function blocks or from
scripts, as well as this internal doors configuration.
VBBS shrinks out of memory for all external programs, re-
serving only a small amount of RAM for its "hooks" that allow
the user to return to the BBS. VBBS creates the CHAIN.TXT,
DOOR.SYS, and DORINFOx.DEF "drop files" which contain user infor-
mation for use by the door program; most doors will accept at
least ONE of these formats. It should be noted, however, that
some games, particularly WWIV- and PCBoard-specific games, re-
quire the use of a door converter because of their use of DOS
interrupts and their methods of handling ANSI graphics.
When you choose item [A] from the VCONFIG Main Menu, you
will see a scrolling-window screen listing the door programs you
have installed, along with the SL needed to access them. Moving
the highlight bar and pressing [Enter] selects that program's
configuration entry.
When configuring a door program in VCONFIG, you will be
prompted for the following information:
1) Program Name
════════════
The name of the door program, as it will be presented to
the user. Try to keep it short; long names will be trun-
cated (not good if you like to include version numbers).
2) Command Line
════════════
The name of the batch file or command line to execute the
door program, along with any command-line parameters that
need to be passed to the door. Again, full pathnames are
recommended.
3) Security Lvl
════════════
The MSL (remember *that* abbreviation?) needed to access
the program.
4) Access Flag
═══════════
If set, allows only those users with matching access flags
to access the program. Access flags are set in the user
editor; for more information, see "The User Editor".
╔═╗ Access flags can be useful in "beta-testing" door programs
╚═╝ to see if you've installed them correctly. Before announ-
cing you've got a new online game, give a couple of your
trusted users access to the game using access flags and
VBBS 6.12 Documentation -- 2-K-2
get them to try to crash the game, tweaking your game set-
up as necessary. Once all the glitches are fixed, THEN
drop the access flag requirement and announce your new on-
liner; this can spare you some grief from vexed hard-core
gamers (the kind of feedback you LEAST want to hear).
5) Single User
═══════════
Indicates whether the game is playable on single nodes or
multi-nodally. Single-line installations should leave
this set to YES.
6) Credit Cost
═══════════
Allows sysops running a credit system to charge credits
for door program access. This is configurable for each
individual game.
╔═╗ Setting up a credit cost for games can either be a great
╚═╝ boost for your message-base traffic, or it can be a night-
mare. If you use this feature, make sure you don't set
your credit costs so high that it takes an inordinate
number of posts or uploads to earn enough credits to play
the games.
D) Delete This Entry
═════════════════
Self-explanatory.
╔═╗ Getting door programs to run correctly, especially upon
╚═╝ exiting and re-entering the BBS, is probably the most
difficult task a sysop faces. Door games are rapidly
becoming more complex, and as they do so, their indivi-
dual requirements and quirks are doing likewise.
In installing door programs, patience IS a virtue; many
times, installation involves a good deal of trial and er-
ror. The importance of reading the door program's docu-
mentation, especially with regard to installation, can
not be overstressed.
In addition, Appendix J contains sample batch files and
command lines for some of the more popular online games.
╔═╗ Some door converters (not included with VBBS) will allow
╚═╝ the sysop to configure a remote sysop drop-to-DOS; this
is a chancy business at best, and caution is advised.
▒▒ For installation of games under OS/2, please refer to
Appendix D for information.
.TOPIC:
Voting Booth
VBBS 6.12 Documentation -- 2-L-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX L B. VOTING BOOTH ║
╚════════════════════════════════════════════════════════════════╝
VBBS' Voting Booth allows you to present your users with
a perpetual survey in which they can "vote" on particular issues
you define. Frequently-asked questions deal with political can-
didates, which online games should be registered/discontinued,
reasons for calling the BBS, how users first heard of your BBS,
how they like changes you've made, etc.
When you select this option from the VCONFIG Main Menu,
you will see a scrolling window containing the questions them-
selves. To select a question for editing, move the highlight
bar to the correct entry and press [Enter]. The question and
its responses will then be available for editing.
To add a new voting question, press [F1] at the scrolling-
window screen. You may then type in a question and supply up to
eight responses from which your users may choose.
The poll results are displayed as the number of users
choosing a particular answer, along with the percentage of the
total number of votes each choice received.
In the default START.V, if new questions exist, when a
user logs on, she is given the opportunity to vote. If the user
is up to date with the survey, the voting questions are ignored.
You may use option [D] from Screen Three of the MAIN configura-
tion to disable this automatic checking if you wish (see p. 15
for details).
There are several VSCRIPT-based voting programs avail-
able, any of which may be used in lieu of the default voting
procedures.
.TOPIC:
Random Messages
VBBS 6.12 Documentation -- 2-M-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX M C. RANDOM MESSAGES ║
╚════════════════════════════════════════════════════════════════╝
VBBS features an optional "random messages" function that
can display one-, two-, or three-line messages right before the
user initially sees the Main Menu. Random messages are commonly
used for quips and quotes or friendly advertisements for other
BBSes in the area; you may, of course, use them for whatever pur-
pose you wish (or not use them at all, if you so desire).
To add a random message, press [F1] at the scrolling-
window initial screen and type in your message. DO NOT press
[Enter], as that will delete the currently-highlighted random
message.
Random messages are displayed by including the RANDOM com-
mand from anywhere within a VSCRIPT or function block.
.TOPIC:
Archive View Configration
VBBS 6.12 Documentation -- 20N-1
╔════════════════════════════════════════════════════════════════╗
║ CHAPTER TWO ANNEX N D. ARCHIVE VIEW CONFIGURATION ║
╚════════════════════════════════════════════════════════════════╝
VBBS allows you to view the contents of a compressed file
within the file transfer directories. The default VBBS comes
configured for .ZIP, .ARC, .ARJ, .ZOO, and .LZH archives; you
may add others if you wish by pressing [F1] at the initial scrol-
ling window and adding the information when prompted.
Note that in order to view the contents of an archive for-
mat, you must have the appropriate archive program where the sys-
tem can find it; including the full path to the program in the
command line is usually the best way to do this.
▒▒ OS/2 version : Please refer to Appendix D for
archiver information related to OS/2.