home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
BBS Toolkit
/
BBS Toolkit.iso
/
doors_1
/
inc_309.zip
/
INC.DOC
< prev
next >
Wrap
Text File
|
1991-11-07
|
24KB
|
561 lines
*
* INCOGNITO *
*
Version 3.09
A Alias Door For PCBoard 14.5x
U S E R S M A N U A L
Release Version 3.09
Copyright (c) 1990,1991 Gary R. Smith
All Rights Reserved
DISCLAIMER
There is made no warranty of any kind, express or implied,
including without limitation, any warranties of merchantability
and/or fitness for a particular purpose. I shall not be liable
for any damages, whether direct, indirect, special or on
sequential arising from a failure of this program to operate in
the manner desired by the user. I shall not be liable for any
damage to data or property which may be caused directly or
indirectly by the use of this program.
IN NO EVENT WILL I BE LIABLE TO YOU FOR ANY DAMAGES, INCLUDING
ANY LOST PROFITS, LOST SAVINGS OR OTHER INCIDENTAL OR
CONSEQUENTIAL DAMAGES ARISING OUT OF YOUR USE OR INABILITY TO USE
THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY.
QuickBasic is a Registered Trademark of MicroSoft Corporation
Turbo C is a Registered Trademark of Borland International Inc.
Borland C++ is a Registered Trademark of Borland International Inc.
CKIT is a Trademark of Data-Comp Information Systems
Note from the author
Welcome to what we consider one of our finer works of art. We are
proud to present to the PCBoard public our newest rendition of
INCOGNITO. The road to this version has been a long and hard
journey, but alas we have seen the light at the end of the
proverbial tunnel.
Rewriting Incognito has taken several months. This rewrite
commenced when Incognito was discovered to have problems working
with multiple nodes on a network. This problem only occurred on
networks that employed over 3 nodes. Keep it to less than 3 and
there was no problem. I could only contribute this problem to the
communication routines that I was using at that time. I have
since switched to the infamous CKIT by Ricky Belitz and have not
seen the problem arise, thus showing off the superior workmanship
of such a fine library of routines and communication support. We
strongly recommend CKIT if you are planning on creating doors for
Bulletin Board programs.
The latest version of Incognito was rewritten in Borland C++ 2.0.
Incognito had its start in MS QuickBasic 4.5 and has matured to a
much faster and compact language. Rewriting Incognito has been a
tremendous learning experience as you can well imagine.
Reduction in size is approximately 25% and with a increase of
speed of up to 300% over the previous versions.
We hope that you enjoy INCOGNITO!
Author
If you are like 99.9% of the sysops world wide, you will want
the latest version of Incognito available on your system.
Incognito's latest version can always be found on Quality systems
Like the boards listed below:
Random Access (RNBB Support!)
Atlanta, Georgia
On-Line Registration Available
(404) 516-7150 (HST)
Incognito is designed to run on systems that utilize PCBoard
version 14.5 + only.
Plans to cover all popular boards are in the works. If you have
a copy of a BBS that you would like INCOGNITO to work on, please
mail a copy to the register address and we will do what we can to
accommodate your system. The BBS files must include setup
documents and file structures if they are provided from the
author. If the BBS requires registration to operate doors then a
registered copy should be sent. Registered copies sent for the
purpose of developing incognito for that BBS Software will not be
used as a active board.
Features of INCOGNITO:
o Detects Loss of carrier!
o Can operate at speeds in excess of 38400 Baud!
o Will automatically log user off after 4 minutes of no keyboard
activity!
o Can be operated on a MultiNetwork Board!
o Allows sysop total control of users allowed in system!
o Allows the sysop to pick the Security Level to be used with the
ALIAS Name!
o Always informs the user Which Name is being used prior to
closing the Door!
o Allows the Sysop to select which conferences the user is
allowed in while using his alias name! (No more restrictions on
number of conferences for registered and unregistered
versions!)
o Allows up to 200 conferences!
o Automatically registers users in all conferences that you
specify!
o Allows user to logoff through the Incognito door and changes
their name back to their real name if the do!
o Incorporates SYSOP designed menus for conference selection
menus, either in mono or color!
o Supports full color and mono systems!
o Allows on line viewing of conferences users are allowed in!
Getting Started:
Setting up INC is simple and straight forward. If you have set up
other PCBoard doors then you should have no problem at all with
this door. This door WILL NOT work with conversion programs
provided for other types of BBS's. It was written especially for
PCBoard 14.5x systems only.
NOTE: If you are currently running a previous version of
Incognito, You must delete all the files. Incognito Version 3.0+
is not compatible with earlier versions.
SETTING IT UP -
Step 1: Create a directory from which Incognito will run from.
This Directory can be called anything you wish that is
within the DOS 8 character limit. (This document will
assume you have selected C:\PCB\INC for the remainder
of the examples).
Step 2: Copy or UNZIP all the Incognito files into the
directory you just created above.
ex. COPY INC-309.ZIP C:\PCB\INC
PKUNZIP INC-309
Step 3: Create the INC configuration file. This file will
contain all the external data that Incognito will need.
Using your ascii editor you will create a file called
"INC.CNF". The name cannot be changed and it MUST be
placed in your Incognito Directory. If this file is not
found a message is written to the screen and the
program is exited.
The below is a Description of each line required
Example -
Line 1 RNBB Software BBS ( BBS Name
Line 2 999999999 ( Registration Number
Line 3 110 ( Security Level (NOTE 1)
Line 4 2,3,4,5,6,7,8,9,10, ( Conferences Users
Allowed In (NOTE 2 & 3)
NOTE 1: A security level is required for this line. This security
level is for the level that you wish users/co-sysops to
access the sysops menu. Users that have a lower access
than this will receive the regular users screen. Users
allowed to access this menu can change ALL information.
You should be very vigilant in assigning users to this
access level.
NOTE 2: Line 4 through Line 25 contain conference information.
The only stipulation here is that the length of the line
may not exceed 80 characters. If you have multiple lines
they may look like the following example. (You can have
from 1 to 200 conferences listed this way)
1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23
26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45
┌──>
└ Only one blank line at the end of the file.
Last but not least, ensure there is only one blank line
after the last conference line.
NOTE 3: Conference 0 (MAIN) is NOT SUPPORTED for regular users,
This is a safety precaution to preclude users using an
alias in the main conference (0) area. If you want a user
to be able to access the Main PCBoard conference with
their alias you will have to give that user co-sysop
level usage.
STEP 4: You now need to construct the batch file that PCBoard
will use to call the Incognito program. If your running
multi-node you will have to make one each of these for
each node your running.
By creating this batch file you are configuring it so
Incognito will run for that node. Each batch file you
create should be like the following example. (Assuming we
are configuring for a single Node)
INC -
Line 1 @ECHO OFF
Line 2 CD C:\PCB\INC
Line 3 INC C:\PCB\PCBOARD.SYS C:\PCB\MAIN\USERS
Line 4 CD C:\PCB
Line 5 BOARD
Line 1 Turns off the Local Screen Echo
Line 2 Changes the directory to where Incognito is stored
Line 3 (1) First is the complete path to that nodes
PCBoard.sys file (You can use the %PCBDIR% variables
for multinode systems)
(2) Second is the complete path to the Users File
Line 4 Changes the directory back to the PCB directory
Line 5 Calls the PCBoard program
NOTE: Your INC batch file should be similar to the example
above, Line 3 however, Must contain the path to both the
pcboard.sys and the users file. PCBOARD.SYS First USERS
Second.
If you are running multiple nodes you will have another INC
batch file, (Like INC2),(Or use the %PCB% variables) that will
contain the same information as the first node file with the
exception of the path to the PCBOARD.SYS file. The users path
should not change.
STEP 5: You now have to create a conference menu. This is the
menu presented to the user. There are two examples
provided. These files must be called CONFLST and
CONFLSTG. If don't want to create a color menu then only
the CONFLST is required. Place these menus in your
Incognito directory and keep them updated with your
current conferences available.
STEP 6: The next and last step to setting up Incognito is to add
Incognito to your PCBoard Doors file. This is done
through the PCBoard setup program. All you need to do
once you are in the PCBSETUP editor for doors is place
the name of the batch file you just created above in a
slot for a door, give it a minimum security level and
your all done. Incognito does not require a users.sys or
door.sys file.
NOTE: When assigning Incognito a security level, ensure
that the level is lower than what you plan to give
to a user so that the user can open the door when
using their alias.
SETTING UP CONFERENCES
STEP 1: To ensure that Incognito works properly with your
conference scheme you will need to edit how you have
your conferences set up.
a. In your INC.CNF file you should have placed the
number of the conferences that you want your users
with alias's to be allowed in.
b. Now modify each conference using PCBSETUP and reset
the "auto-rejoin conference" flag to "Y". If this is
not done, PCBoard will return the user to the Main
Board Conference with their Alias and Alias Security
Level If they log off and then back on again. So
ensure this flag is changed.
c. You must now change PCBoard.dat file using PCBSETUP
so that a user cannot (A)bandon or (J)oin a
conference when they are at the alias security level.
They should be able to at a minimum (R)ead messages,
(E)nter messages, and (OPEN) doors (Or at least
reopen the Incognito door so they can get back to
their Real Name and Security Level.
Ensure that after changing the parameters that you do
not affect what commands your regular non-aliased
users can/cannot use.
NOTE: (SUGGESTION) We would like to suggest that you make a
security LOGON file for the security level you select for
alias users, so that in the likely hood that they log off
with their alias name they will understand that they need
to open the INC door to restore their previous Name and
Security Level.
Your now all set to run INCOGNITO !!...
RUNNING INCOGNITO
_________________
Now that you have set up the incognito door, We can imagine that
you are all ready to get into it and see what it does. Incognito
is a door utility that allows sysops the capability of allowing
his users to use an alias name. This can be very handy when
dealing with message bases of an adult nature or where an alias
would be preferred such as the Medical conference of RIME or the
Adult conferences found on many boards that carry the THROB net.
Below is a suggested method for starting your Incognito program.
STEP 1: Logon as the sysop and OPEN the Incognito Door.
STEP 2: You will be asked for an alias name.
STEP 3: Since this was your first time through, you will be
logged out of the incognito door.
NOTE: You have now just created the INC.USE file, This is the
users file that Incognito will use to keep track of all alias's,
real names, security levels, etc...
STEP 4: You may now reopen the door and access all the sysops
functions. Remember your users don't get this screen
unless you assign them a high enough security level to
match what you entered in the INC.CNF file.
a. Setting up for a CO-SYSOP.
Co-Sysops will also get the screen you are now observing.
if a co-sysop is to be entered, they should follow the
exact procedures as the sysop for first time logon. Then
the sysop or co-sysop can verify them as a user (PRIOR)
to them using their alias.
ATTENTION:
Sysops and Co-sysops have a couple of rules to follow when
using alias's. #1. You will not be able to use your alias
if you just approved yourself (exit and reenter to use).
#2. You cannot perform maintenance if you are not using
your real name. #3. You cannot use you alias if you have
not approved yourself.
STEP 5: That's it!, All you have to do is now wait for users to
enter the door and request an alias. once this is done,
You validate and your on your way. Enjoy Incognito!
List of Commands
By opening the INC door you as the sysop will view a menu of
items that you may preform.
The menu is as follows:
1. Lets you elect to use your REAL or ALIAS name.
NOTE: If you are using your REAL NAME the menu will state
" 1. Utilize your Alias Name "
If you are using your ALIAS NAME the menu will state
" 1. Utilize your Real Name "
2. Verify New Users - Select this option to validate all new
users that have requested an alias. When selected you will be
presented with each new user (One by One) to validate,
Entering "Y" will validate, (RETURN) will skip to the next
record. If you select "Y" you will be asked to enter a
security level that user will receive when they use their
alias name. Enter the alias security level. (Pressing RETURN
will enter a zero (0) to the file)
You will then be asked to register all users in the
conferences you have indicated in the INC.CNF file. If you
enter "Y" the user will receive a R flag in each of the
conferences listed in the INC.CNF file. (This makes it easy if
you have a lot of conferences to enter users into. (INCOGNITO
will register them in any number of conferences, Not just the
first 40!).
NOTE: Previous versions of INCOGNITO wrote messages in the main
directory to the user letting them know of the approved
application. This is no longer done.
3. Delete Selected Users - Use this option to deleted selected
users. You must know the users REAL NAME in order for
Incognito to find the name and delete it.
4. List all Users - Use this option of view all users Real Name,
Alias Names, And both Security Levels assigned. If you have a
color monitor validated users will be yellow and non validated
users will be blue.
5. Change Users Alias/Security levels - Use this option to change
any users alias name or alias security level. You must know
the REAL NAME of the user to perform this option. (You must
also be using your real name to do this operation)
6. Available Conferences - Use this option to list all the
conferences that you have listed as available for your ALIAS
users. If there is no conference number assigned, the slot
will be printed as (EMPTY).
7. Return to PCBoard (Quit) - Use this option to return to the
main board.
NOTE: All options may also be accomplished by enter the first
letter of line. ex. If you want to list users instead of
pressing 4 you may select "L"...When returning to board the
letters/numbers (7,R,Q) are all valid inputs. The letters
are highlighted on a color monitor.
USER OPERATION.
STEP 1: When a user wishes to use an alias, That user must only
Open the Incognito door and request an alias. First time
users will go through the same steps that the sysop
preformed above. If a user comes back to the door and the
request has not been approved, an appropriate message
will be presented to the user.
STEP 2: After sysop / co-sysop approval, the user will be
presented with a menu of options. The list is explained
below.
1. Enter a conference - The user will select this option
when they desire to use their alias name. Once
selected they will be presented with the menu
(Conflst) of selections. If the conference they select
is a valid conference you have listed in the INC.CNF
file they will be placed in that conference with their
alias name and security level. If that conference is
valid in the INC.CNF file but is not a valid
conference in PCBoard the user will be placed in the
Main board area with alias and alias security level.
So be careful and make sure all conferences are valid
ones. If the user decides to join another conference
they must open Incognito again and select another
conference.
2. Quit to PCBoard - Using this option will send the user
back to the main board (conference area 0) with their
original name and security level.
3. Logoff - Selecting this option will log the user off
the board. Their name and security level will be
changed automatically back to their original, and the
time on that day will be logged to the users file.
INCOGNITO is Shareware. You are granted a TWO week trial period
in which you may evaluate INCOGNITO. If you continue to utilize
this product you are required to register it with the author. If
you do not register INCOGNITO within the required time frame
allowed, You are REQUIRED to remove it from your board in
accordance with the United States Copyright Laws governing the
use of Pirated Software.
This program is not crippled in any way. It is full featured in
that it will do everything that a Registered version will. The
"Not A Registered Version" will not be shown on the ending screen
for registered members. There are no extra pauses, bells, beeps
etc... in Incognito.
If you register your copy of INCOGNITO, you will receive a
registration Number to place in your INC.CNF FILE.
The most important part of registering is that you will have
peace of mind knowing that you did.
To register your copy of INCOGNITO, Fill out the form
CALL OUR SUPPORT BOARD AND REGISTER VIA MASTERCARD/VISA/AMEXPRESS
(Registration is instant and OnLine. You will receive your registration
number instantly!)
(404) 516-7150
Register.doc and mail it along with $19.95 to :
Gary R. Smith
5012 Olde Mill Drive
Marietta, Georgia, 30066
Make all checks payable to
Gary R. Smith
All checks must be drawn from U.S. Banks...No foreign currency
will be accepted. (This includes Canadian) Please include in the
Registration form, exactly how you would like your BBS name to
appear on the Closing Screen.