Bulletin Board Name Enter the name of your Bulletin Board. This name is displayed to all callers at logon. System Operator Enter the name of the system operator. This name should havean account in the USERS file. Main Bulletin Board Directory Enter the Main file directory for your BBS. This directory may be shared by a NODE. Example: C:\FNET Sysop Mail Security Level Enter the access level required to read or delete mail in all conferences. Assign this security level only to those users you have full trust and confidence in. Enable the "Today" function Enter a "Y" to enable the TODAY function. You must have the file "today23.exe" (or some other version of this or a similar program. You should create two files with your "TODAY" program - an ASCII and ANSI version (if desired). The path/name of the ansi version MUST be placed in the "File Locations (2)" configuration. Notice ------ The "TODAY" program should be run in conjunction with an EVENT or run from the "$$LOGON.BAT" file which is run wheeach user logs onto the bbs. Modem Initialization String Enter the Initialization string for your modem. This will vary from one modem to another depending on the modem's characteristics. A general string for all modems is: ATE0Q0M1V1S0=0S2=1S7=45&C1&D2H0 Open Baud Rate (300-38400) Enter the speed to open your modem at. This is usually the highest speed your modem will handle. Examples: 300, 1200, 2400, 4800, 9600, 19200, 38400 Lock Comm Port at Opening Baud Rate Enter a "Y" if you wish to "LOCK" the computer to modem speed at the "opening" baud rate. If your modem has a maximum speed of 2400 you will normally answer "N" to this question. New Caller Security Enter the security level to be assigned new users (0-255) This security level MUST also be included in the "PWRD" file. See the fnet.doc file for the format of the PWRD file. Enable Questionaires Enter a "Y" if you wish to enable script questionaires or enter an "N" to disable the questionaire function. Number of Questionaires Enter the number of questionaires available for users to answer. Seconds to wait for carrier Enter the number of seconds the bbs should wait for a carrier after it has issued the answer command to the modem. Some modems, particularly high-speed types with the v.32 or v.42 standards, have long a considerably long carrier detection handshakes. If you have one of these modems or a US Robotics Dual Standard modem ensure you set this value toat least 45 seconds. Event Batch File Enter the name of the event batch file. The name MUST NOT have the ".bat" extension. FeatherNet will add the extension when the event is run. Time to Run Event Enter the time (Military Format) when the event is to be run. This time is based on a 24 hour clock. 10:00 pm wouldbe entered as 22:00 while 4:30 am would be entered as 04:30 It is strongly recommended that your event is NOT run at midnight (24:00) to avoid the possibility of a time conflictwith the computer clock. Minimum Baud Rate Allowed Enter the minimum baud rate you are going to allow callers to connect at and continue with the session. Lower baud rates will be notified that their connect baud rate is not currently allowed and will be immediately logged off. Registration Number Enter the bbs registration number given you when you have paid the ShareWare registration fee for the bbs. If you have not registered FeatherNet enter "0" as your registration number until you have decided to register. Add Custom "zip" Commants Enter a "Y" if you wish all uploads to receive a "custom" "zip" commant. Otherwise enter "N". Read the documentation in "fnzipcmt.zip" for e-z setup of custom "zip" comments. Minimum Upload Drive Space (KBytes) Enter here the number of kilobytes which must be free on your upload drive before an upload is permitted. The number entered is multiplied by 1024 to get the actual number of bytes that must be free. Number of Bulletins Enter the number of bulletins currently available for reading. Work Directory Enter the work directory for this NODE. This directory MUST be unique to this node and NO permanent files should ever bestored in this directory. The directory is purged each call. Safeguards prohibit you from selecting your bbs node or bbs main directory as the work directory. Maximum Number of Messages to Capture This value determines the maximum number of messages that can be archived into the capture file. Keep in mind that the captured messages are processed in thework directory. If the work directory is a ram disk it could fill up and the capture command will fail. Operate in a Subscription Mode Enter "Y" if you desire the bbs to be operated in a paid subscription mode. When a subscription expires FeatherNet will reduce the security level to the "expired" level Days Warning Before Subscription Expires A warning notice will be displayed to any user whose subscription is expiring within the number of days entered. Expired Subscription Security Level Enter the security level to be assigned to users when their subscription expires. Operate in a RingBack Mode Enter a "Y" if you wish the bbs to operate in a "ringback" mode. This is handy when only one phone line is available and you wish the bbs and the "folks" to share it without a hassle. See the fnet.doc file for the operation of the ringback mode. Seconds to Wait for RingBack Enter the number of seconds the bbs will wait for the "ringback" call if operating in ringback mode. 45 - 60 are suggested values. If a ringback does not occur in the time allowed the "ringback" is canceled and the bbs awaits the initial ring. Node Number Enter the node number you are configuring. If you have a single node BBS it will be node 1. Comm Port (0-4) Enter a number 0-4 to indicate the serial port this configuration will utilize. Enter a "0" if you do not wish to use a comm port and want alocal node available for the Sysop's use only. Node Directory Enter the path from which this NODE is to be operated from. It may be the same as the BBS main directoryprovided no other node is sharing the main bbs directory. Example: C:\FNET\NODE1 Using a "Front-End" Loader Enter "Y" if you desire to utilize a "front-end" loader to load Feathernet when a call is received. The following paramaters are used to determine the caller's baud rate and type of connection. /C:0 (Local Logon); /C:1 (300 baud); /C:2 (1200 baud) /C:3 (2400 baud); /C:4 (4800 Baud); /C:5 (9600 baud) /C:6 (12000 baud); /C:7 (14400 Baud); /C:8 (Sysop Logon) If a caller connects with an error correcting modem (to yourerror correcting modem) "/ERR" is also passed. Operating Under DesqView Enter a "Y" if you are running FeatherNet under DesqView from QuarterDeck Office Systems. FeatherNet will automatically return "time slices" to the CPU when the bbs is idle or waiting for input from a caller. Try this option if you are using another multitasker also. Add "uploaded by" to Description Enter "Y" if you want feathernet to add "Uploaded by: " and the caller's name to the file description after each upload.Enable High Ascii Filter Enter "Y" if you wish Feathernet to filter all ascii characters above # 127. These are normally associated with line noise. IF your have foreign (non U.S.A.) callers using your system you might want to leave this option OFF ("N") Location of Security Level Messages Enter the drive and directory where the security level specific message text files are located. Example: C:\FNET\SECMGG\ These file MUST be named the access level for which they areintended to be shown during the logon sequence. Example file names: "10" "30" "50" "115" "255" Minutes Before FeatherNet Recycles Enter the number of minutes before FeatherNet will terminateand allow the "SR.BAT" file to re-load the bbs and reset themodem when waiting for a call. This is available due to some modems become "DEAD" after a period of being idle. This is generally only necessary if running under an emulated multitasker such as DESQVIEW. Duplicate Upload 'hold' Directory Enter the path to the directory you wish all uploaded files which are duplicates of files already in the 'upload' directory to be moved into. This prevents a user from causing a file in the 'upload' directory to be overwritten by a file with the same name. Example: C:\FNET\DUPES\ Download Security Level Enter the security level required to use the 'D' command from the file transfer area to 'DOWNLOAD' files from the BBSto the user's system. Note: MUST be 0-255 Upload Security Level Enter the security level required to use the 'U' command from the file transfer area to 'UPLOAD' files to the BBS from the user's system. Note: MUST be 0-255 File Transfer Area Security Level Enter the security level required to use the 'F' command from the main BBS menu or from a conference to enter the file transfer area. Note: MUST be 0-255 Use Color Graphics during a Local Logon Enter "Y" if you wish the bbs to be in color mode when you logon locally. Color may be turned off/on at the main menu with the "S" command regardless of this setting. Force Users into a Door at Logon Enter the Number of the door you wish users with a certain security level to be 'forced' into during the logon sequence. Enter a zero ("0") if you do not wish to utilize this function. Time credit For Uploads Enter the amount of time to be credited to a user for uploading files. This number may have 2 decimal places. A credit of 0 will charge the user the amount of time the upload sequence lasted with no credit given. A credit of 1.0 will make the time of the upload 'free' time. Security Level to be 'forced' into a Door Enter the security level to be 'forced' into a door during the logon sequence. This is effective only if the above option has a door number entered. Prompt Callers at logoff if 'Download Flags' are Set Enter a "Y" if you wish to prompt users at logoff who have files flagged for download. This will give them another chance to download the files before the flags are 'reset' after logoff. Prompt callers to set Message Pointers at Logoff Enter "Y" if you desire to have the callers asked if they want their 'high' message read flags to be set to the highest message in each conference defined for the bbs. The advantage of setting the high message read pointer to the highest message in each conference is that callers who usually only read private mail will keep their high message read updated. A user reading private mail or public mail addressed to him during the logon sequence does not get the message read pointers updated. Use a 'custom' Program or Batch File to Check Uploads Enter "Y" if you desire to use a 'custom' or 'sysop chosen' batch file or program to test uploads or check for virii. Keep in mind that the file 'FNCHK.EXE' is a Vital and necessary part of Feathernet and MUST remain in the dos path for the bbs to properly handle newly uploaded files. FNCHK.EXE will update the 'uploads' or 'private' directory list files. Name of Custom Program or Batch File to Check Uploads Enter the file name (12 characters max!) of the program or 'batch' file to run immediately after an upload sequence is completed. This file must reside in the Node directory. Shell to External Protocols and Archive Manipulations Enter a "Y" if you desire Feathernet to 'SHELL' to all the external protocols and archive manipulations. This will mean considerable speed increase in the bbs operation in these evolutions. Path & Name of 'Fossil' Driver Batch File ** ( ONLY Necessary if you 'SHELL' to file Transfers ) ** Enter the path & name of a batch file to re-activate the fossil driver after a file transfer. Example: C:\FNET\BNU1.BAT The serial port can be effectively disabled by the protocol driver upon termination of the transfer. If you desire to use the 'SHELL' to protocols make a batch file in each node directory which 'activates' the fossil driver'. A batch file for the 'BNU' fossil driver used on comm port #1 would be: BNU /I=0+ Swap FeatherNet to XMS, EMS, or Disk During a 'SHELL' FeatherNet 'SHELLS' to DOS when the Sysop presses the F9 key or when running FNCFG.EXE, FNETSM.EXE , or FNFILER.EXE from within the bbs. SHELLing is also performed if the above option is set to "Y". Entering a "Y" will cause FeatherNet to attempt to SWAP itself to Extended Memory (supplied by an XMS driver, such as HIMEM.SYS), expanded memory (EMS version 4.0), or disk, thus freeing up more memory for DOS. If attempts to swap using all three methods fail then FeatherNet will SHELL while remaining in DOS memory. Security Level to List Users With (U) Command Enter the Security level required to list users with the (U) Command from the Main Menu (0-255) Today's Callers Security Level Enter the Security level required to utilize the command (T)oday's callers from the main menu area (0-255). Allow (P)rivate File Transfers Enter "Y" if you wish to allow certain users the ability to upload and download PRIVATE files. A user may only send private files to another user who is authorized this function by the sysop. Location of the PRIVATE File transfer File Directory Enter the Complete DOS Directory Path to the (P)rivate file transfer directory. This directory will contain PRIVATE files authorized users send to other authorized users. Example: C:\PRIVIT\ Pause for 3 Seconds after CONNECT at 2400 or Less Baud Enter a "Y" if the bbs should pause for 3 seconds after a CONNECTION is established at 2400 or less baud. Some modemstake longer than others in detecting the baud rate. As a rule of thumb if there is a 2-4 second delay from the time the modem establishes a connection until the 'CONNECT' message is reported then you should answer "Y" here. Security Level to Archive & Download Mail Enter the security level (0-255) required to archive and download mail. Allow the Use of Split-Screen Chat Mode Enter a "Y" if you want the Split Screen Chat mode availableto callers with ANSI capability detected at logon. The Split Screen Chat mode allows the simultaneous sending and receiving of data thus increasing the efficiency of the chatmode. Force all Users to Select File Transfer Protocol Enter a "Y" to force all users to select the file transfer protocol after they enter a "D" or "U" from the file transfer area. Users taking advantage of the "command stacking" feature will not be forced to select a protocol. Total Number of Nodes on Your System Enter the total number of nodes you have configured on your system. This allows FeatherNet to limit the number of entries in the "UserNet.Dat" file to the exact number of nodes in operation. You must ensure ALL nodes have the same number for nodes configured. Disable the Auto ANSI Detect Function at Logon Some networks apparently have trouble dealing with the ANSI status request ("n") and this option allows the sysop to completely disable the ANSI detection at logon. Disabling the auto ANSI will mean ALL users will not have the quicker ansi cursor movement sequences available unless they are using the Visual Message Editor. Ensure the "apparent problem" with the auto ANSI detect sequence is notunique to one user which may be a configuration problem. If you disable Auto ANSI you also disable the split screen chat mode. Default New User Subscription Expiration in Days Enter the number of days you want new users to have until their subscription is expired. Previously, FeatherNetdefaulted to 5 days. This may now be 0 - 999 days. Sysop Page Start Time When the Sysop Page is turned Off the Sysop cannot be Paged.When Sysop Page is turned ON this field is the Start time at which callers may page the Sysop for chat. If you are only available from 17:00 until 22:00 you might want to use these times as the chat page start and stop times. Sysop Page Stop Time When the Sysop Page is turned OFF the Sysop cannot be Paged.When Sysop Page is turned on this field is the Stop time at which callers are not permitted to page the Sysop for chat. If you are only available from 17:00 until 22:00 you might want to use these times as the chat page start and stop times. Allow "Aliases" or One-Name Users Enter a "Y" if you want to allow users to logon with Aliases or with one Name. All user names must begin with letters between A..Z Allow the "SYSOP" to Logon Remotely Enter a "Y" if you want to allow the user named "SYSOP" to logon remotely. If you do so, ensure the password you have assigned this user record is VERY unique. SHIFTED Function Key Assignments You may enter up to ten SHIFTED function key assignments. These "strings" may be entered at the local keyboard insteadof having to type the text in each time. For example, you could set the F1 key to send the string "F N S A" when you are at the main menu to scan for new files in all directories. By assigning your "signature" to a key, you will only have to press the SHIFT and functionkey to sign a message. Place "^M" in the definition to simulate pressing the ENTER key. Examples: Ron Pierce^M F N S A^M Limit Sysop Paging Hours This allows you to disable the hours the sysop is available for chat. If this options is selected to "N" then users may page the sysop at any time provided the sysop has the chat page turned on. Download Batch File Path/Name Enter the FULL path and name of a batch file to execute whena file download is performed. This allows you to do anything your system might need to do prior to and after a file transfer. If configured, the batch file is again run after the file transfer with a paramater of "1" so you can tell your batch file to 'goto' the proper label for anythingyou might need to do AFTER the file transfer such as reinitializing a disk cache. See the sample transfer batch file 'xferbat.bat' which contains suggested batch file syntax. Example: C:\FNET\XFERBAT.BAT Path and name of "FNETTEXT" File Enter the full dos path and file name for the 'FNETTEXT' file. This option allows you to utilize a RAM drive for faster access to the file and less wear and tear on your hard disk drive. Example: C:\FNET\FNETTEXT Directory Control File Options Selection Enter an "A" to ADD a Directory Control File. Enter a "D" to DELETE an existing Directory Control File. Or you can enter the number of an existing Directory Control File to EDIT. Editing Directory Control File Paramaters Enter "Y" to edit the paramaters of the Selected Directory Control File. Menu for DIrectory Listings Enter the path and name of the menu file for this conference's directory listings. Example: C:\FNET\DIR0 Maximum Lines to Display When Reading From Archive Enter the maximum number of lines users will be allowed to read when performing archive manipulations. This allows theSysop to prevent users from capturing complete text files and bypassing download byte limitations. Path/Partial name for DIRxx Files Enter the path and a partial name for the directory listing files for this control directory. The 'name' MUST be 5 or fewer characters as FeatherNet will append the actual directory number to this "name" when accessing the DIRxx files. Example: C:\FNET\DIR Note that the actual names of the DIRxx files would be: DIR1, DIR2, DIR3, etc... Description for this Directory Control File Enter a one line description for this Directory Control File. This description is for use in FNCFG.EXE (FeatherNet Configuration Utility) and is not needed. It can used to remind the Sysop what the files in each Control Directory pertain to. Name of this File Control (DIR.LST) Directory Enter a legal DOS file name for this Control Directory. Any legal DOS file name is ok. The Directory Control file contains the information FeatherNet uses to determine the number of file areas, access to file areas, additional download paths, new uploads directory listing and path/name of description files (DIRxx files). Example: DIR.LST Menu File for this Control Directory Enter the full path and name of the menu file for this Control Directory. The file name should be 7 or fewer characters since an ANSI (COLOR) version may also be used. If used, the file name of the ANSI version MUST end with "G". Example: C:\FNET\DIRMEN1 IF you wanted to also use an ANSI version of the above file (NOT required) its name would be "C:\FNET\DIRMEN1G" Delete Which Control Directory Enter the number of the control directory to delete. Just press [ENTER] to abort the deletion process. Edit File Directory Information Enter the # of a file directory to edit. Enter "P" to edit the path of the UPLOAD description file. Enter "Q" to QUIT the directory editing options. Enter "I" to insert a NEW file directory. Enter "U" to edit the path to where new uploads will be placed. Title of this File Directory The "title" is a generally a brief description of the files which are located in the directory listing. Sample titles: MS-DOS Utilities Telecomunications Programs Security Level Required for this Directory You can limit access to the files in this directory as well as the displaying of the files listing for this directory bysecurity level. Enter a security level required to view thefiles in this directory and download them (0 - 255). Location of Files for this Directory Enter the DOS directory in which files for this directory will be located. This can be any directory on your computersystem. Example: C:\FILES\UTILS\ File Search Method The "Search Method" is the method FeatherNet will use to locate files on disk. The "DOS" method checks the actual DOS directories for files. The "INDEX" method utilizes an index file created with the "DIRNDX.EXE" program. You MUST have an index file created to use the INDEX method or problems will certainly arise. If you use a CD-ROM the INDEXmethod is recommended, otherwise use the DOS method. Press ENTER to toggle the "search method". Use the Up/Down arrows to move to another item. Delete a File Directory Enter the number of the file directory to delete. Just press [ENTER] to abort the deletion process. Upload Description File (Public Uploads) Enter the path and name of the file to contain the descriptions for new public uploads in this conference. These files are available for downloading if a user's security level is sufficient. Example: C:\FNET\UPDESC Upload File Path Enter the UPLOAD file path. This is the DOS directory which new uploads will be kept in after being uploaded. Notethat new files are RECEIVED in the NODE work directory then moved to this UPLOAD directory after being tested/verified. Example: C:\FNET\UPLOD\ Upload Directory Security Level Enter the security level required to download files from theupload file directory and to list the files and descriptions of these files. The security level may be from 0-255. Press "ENTER" to toggle the "search method". Use the Up/Down arrows to move to another item. Press "F1" for additional help on this topic. Additional Download Directory Menu Enter the # of an additional download directory to Edit. Enter "A" to add an additional download directory. Enter "D" to delete an additional download directory. Enter "Q" to Quit! An "Additional Download Directory" can be any directory on your computer system in which you have files available for downloading. NOTE: You should not use a directory already configured for a specific file directory as an additional download directory. This would serve no useful purpose. Enter Additional Download Directory Path Enter the DOS path for this additional download directory. This may be any directory on your system or on a cd-rom. The directory is protoced by security level but ensure you do not allow anyone access to your bbs system files. Example: C:\FNET\UTILS\ Security Level for this Additional DOS Directory Enter the security level required to download files from this Additional DOS Directory. The security level may be from 0-255. Delete Additional Download Directory Path Enter the number of an Additional Download Directory to delete. Conference Configuration Options Enter the # of a Conference to edit. Enter "A" to add a conference (maximum conferences is 512). Enter "L" to list conference information. Enter "Q" to Quit! Delete a Conference Enter the Conference number to delete. You will be promptedto continue the deletion prior to the deletion. Conference Configuration Menu Select an item to edit for the conference you are configuring or modifying. Enter a # (1-9) corresponding to the item to be edited. Press ENTER or "Q" to abort. Conference Name Enter the name of this conference. It may be up to 25 characters in length. Example: Assembly Programming Read Security Level Enter the security level required to read messages in this conference. (0-255). This setting along with the USERS' security level allows you to control access to conferences. Message Blocks Enter the number of message blocks to allocate to this conference (1-4). Each message block allows up to 1024 messages to be contained in the message file for a given conference. The maximum number of message blocks is 4 which allows up to 4096 messages for a conference. Reply Security Level Enter the security level required to reply to a message after reading it. (0-255). This setting along with the USERS' security level allows you to limit a user to being able to read messages but not being able to reply to a message after reading it. Write Security Level Enter the security level required to enter a new message 0-255). This setting along with the USERS' security level allows you to control the privilege of writing messages. Message File Path & File Name Enter the complete file path and file name for this conference's messages. Example: C:\FNET\MSGS\ASSEMBLY NOTE: The message file name MUST NOT have a file extension.There is an accompanying index file created with each message file. It has a ".NDX" file extension appended to the name of the message file. Directory Listing Control File for this Conference Enter the Directory Listing File to use with this conference. Assigning a directory listing file to a conference enables file transfers within a conference. Users with proper security level may use the "F" command after joining the conference and perform file transfer functions on the files available. Example: C:\FNET\DIR.LST Echo This Conference "ECHO" refers to a conference's messages being connected to other systems via a netmail or relay mail network. Enter a "Y" if you wish to echo this conference or an "N" if you do not desire to echo it. Make this a PUBLIC Conference A public conference is one that any user may join provided his security level is sufficient. A private conference is one in which the Sysop MUST grant access to individual users with the FeatherNet User Editor (FNETSM). A user MUST have the required security level to join a private conference as well. Download Paths Listing File Enter the path and name of the file which will contain the paths to the files available for downloading in this conference. This file may be shared by other conferences toallow users to download from other conferences. A popular configuration is to define one download path file and use itfor each conference. Example: C:\FNET\DLPATH.LST Security Level Required to Kill a Message Enter the security level (0-255) required to KILL a message addressed TO or written BY a user. Door Batch Filename This is the name of the door. Example: FNMAIL The name entered here corresponds with the exact name of thedoor file on disk. That is, "FNMAIL". The file "FNMAIL" would then be copied to "DOOR.BAT" by FeatherNet prior to executing the door. The location of the file is determined by your answer to thePath question. When blank the the default directory is assumed. Door Password If a password is entered in this field then the caller must know the password (if he does not have Sysop Access) in order to open this door. If the field is blank then no password is required. Door Security Level Enter the security level required in order for a caller to open this door (0 - 255). Auto Login Doors When a caller logs on FeatherNet will check the DOORS.DAT file for any Auto Login Doors which are specified by answering YES under this column. A user having a security level that matches that which is specified under the Security Level column will then be sent into the door automatically as part of the logon process. Create DOOR.SYS File Enter a "Y" if you want FeatherNet to create a "door.sys" file. Some door programs will use a door.sys file. Shell / SWAP to Door Y = Yes, shell out to the DOOR (gives faster return from door) S = SWAP FeatherNet out during the shell N = Do not shell, exit FeatherNet compledely NOTE: the DOOR file should end with a call to SR.BAT if this switch is set to "N" and should NOT end with SR.BAT if set to "Y" or "S" (i.e. when shelling FeatherNet is already loaded so it the door file need not re-load it - but when not shelling the software must be reloaded in order to continue). Path to Door Batch File Enter the path to the door batch file. FeatherNet will lookin the specified directory for the door batch file if you enter a path. Otherwise, the NODE directory will be searched for the door batch file. Example door batch file path: C:\FNET\FNMAIL\ Security Level for Download Path Enter the security level required to access files in this path. The security level must be 0-255. This controls access to this path for any file functions (i.e. download, archive manipulations, reading text file). Directory Listing File Name Enter the path and name of the file which will contain the descriptions for the files available for downloading from this entry. Tis sometimes referred to as the DIRxx file. Example: C:\FNET\DIR1 Download Path Enter the default download path for this entry. FeatherNet will search the this directory and those in the DLPATH.LST (type) file for files. Example: C:\FNET\DLDIR_1\ Directory Security Level FeatherNet imposes a security level restraint on EACH file directory listing as well as each download path. Users may not view the directory listing unless they have proper security level. Enter the security level required for this directory (0-255). Title of Directory Enter a "title" for this directory. It is normally related to the type of files included and available for download. Example: General Dos Utilities Upload Description File (Private Uploads) Enter the path and name of the file to contain the descriptions for new PRIVATE uploads in this conference. These files are available for downloading if a user's security level is sufficient. Example: C:\FNET\PRIVATE Private Upload File Path Enter the PRIVATE UPLOAD file path. This is the DOS directory which new PRIVATE uploads will be kept in after being uploaded. Note that new files are RECEIVED in the NODEwork directory then moved to this PRIVATE UPLOAD directory after being tested/verified. Example: C:\FNET\PRIVUL\ Private Upload Directory Security Level Enter the security level required to download files from thePRIVATE UPLOAD file directory and to list the files and descriptions of these files. The security level may be from 0-255. Index File Name Enter the path and name of the INDEX file to use (if any) for locating files available for downloading within this conference. This feature is usually desired ONLY if you utilize a CD-ROM for storage of download files due to the slow seek times they have. If you enter a path and name for this entry, ONLY the index file will be accessed to locate files. You should ensure you have properly created an index file which includes all the possible paths to files in this conference (less the UPLOAD and PRIVATE UPLOAD directories). Example: C:\FNET\INDEX\INDEX_1 Download Path Enter a download path for this entry. This must be a directory on your hard drive or a cd-rom. FeatherNet will search the this directory file for files if a user's security level is sufficient. Example: D:\UTILS\ Security Level to Carbon Copy Messages Enter the security level required for a user to send a "Carbon Copy" of a message to another user (0-255). A user with sufficient security level can send as many "cc" messages as he or she wishes. BULLETIN Menu FIle Enter the path and name for the Bulletin Menu file for this conference. You may share the same file for both ascii and ansi versions if you use wish. Example: C:\FNET\BLTMEN BULLETIN List File Enter the path and name for the Bulletin Listing file for this conference. Example: C:\FNET\BLT.LST DOOR Menu FIle Enter the path and name for the Door Menu file for this conference. You may share the same file for both ascii and ansi versions if you use wish. Example: C:\FNET\DOORMEN DOOR List File Enter the path and name for the Door Listing file for this conference. Example: C:\FNET\DOORS.DAT BULLETIN Text File Path & Name Enter the path and name of the bulletin (text file) for thisentry. The actual file name should be limited to 7 or fewercharacters to permit appending a "G" to the filename for an ansi bulletin cooresponding to the ascii bulletin. Example: C:\FNET\BLTN-1 Note: For the above ASCII bulletin path/name you could havean ANSI version titled "BLTN-1G" located in the C:\FNET sub directory for users with color graphics selected. MAIN Menu Text FIle Enter the path/name of the Main Menu Text File. This is the file users see at the main bbs command prompt when in non-expert mode or when they enter the "?" command at the main bbs command prompt. Example: C:\FNET\MAINMEN (non-graphics file) Example: C:\FNET\MAINMENG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. CONFERENCE Menu Text FIle Enter the path/name of the Conference Menu Text File. This is the file users see at the conference command prompt when in non-expert mode or when they enter the "?" command at theconference command prompt. Example: C:\FNET\CONFMEN (non-graphics file) Example: C:\FNET\CONFMENG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. FILE TRANSFER Menu Text FIle Enter the path/name of the File Transfer Menu Text File. This is the file users see at the File Transfer command prompt when in non-expert mode or when they enter the "?" command at the File Transfer command prompt. Example: C:\FNET\XFERMEN (non-graphics file) Example: C:\FNET\XFERMENG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. SCRIPT Questionaire Menu Text FIle Enter the path/name of the Script Questionaire Menu Text File. This is the file users see after entering "Q" from themain memu to list the available questionaires to answer. Example: C:\FNET\SCRIPT (non-graphics file) Example: C:\FNET\SCRIPTG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. LOGON Text File Enter the path/name of the Logon Text File. This file is displayed at logon immediately after a user selects to use graphics mode or non-graphics mode. Example: C:\FNET\LOGON (non-graphics file) Example: C:\FNET\LOGONG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. NEWS Text File Enter the path/name of the News Text File. This file is displayed at logon immediately after a user enters his/her password. It is ONLY displayed if the file date/time is more recent that the date/time of the caller's last use of the bbs. Example: C:\FNET\NEWS (non-graphics file) Example: C:\FNET\NEWSG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. WELCOME Text File Enter the path/name of the Welcome Text File. This file is displayed at logon immediately after the NEWS file. Example: C:\FNET\WELCOME (non-graphics file) Example: C:\FNET\WELCOMEG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. NEWUSER Text File Enter the path/name of the NEWUSER Text File. This file is displayed to NEW users after they fill in the registration questions and the new registration questionaire. Example: C:\FNET\NEWUSER (non-graphics file) Example: C:\FNET\NEWUSERG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. CLOSED Text File Enter the path/name of the CLOSED Text File. This file is displayed to NEW callers if the bbs is operated in a "CLOSED" mode. Unregistered callers will be allowed to answer the new registration questions. Then this file will be displayed and the users logged off. Example: C:\FNET\CLOSED (non-graphics file) Example: C:\FNET\CLOSEDG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. CALLER LOG File Enter the path/name of the CALLER log. This file contains information about what each user on the system does or attempts to do. Example: C:\FNET\CALLER.LOG Note: There is no graphics version of this SYSTEM file. EXPIRED WARNING Text File Enter the path/name of the EXPIRED WARNING Text File. This file is displayed at logon if the bbs is run in a subscription mode and the user's expiration is within the number of days specified in the modem/subscription/node configuration. Example: C:\FNET\EXPWARN (non-graphics file) Example: C:\FNET\EXPWARNG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. EXPIRED Text File Enter the path/name of the EXPIRED Text File. This file is displayed at logon if the bbs is run in a subscription mode and the user's account is expired. Example: C:\FNET\EXPIRED (non-graphics file) Example: C:\FNET\EXPIREDG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. NEWUSER Script File Name Enter the path/name of the NEWUSER registration questionaire. This is presented a new user after he/she completes the bbs' new user registration edits. Example: C:\FNET\SCRIPT.0 LOGOFF Text File Enter the path/name of the LOGOFF Text File. This file is displayed at logoff after a user enters the "G" command to log off the system. Example: C:\FNET\BYE (non-graphics file) Example: C:\FNET\BYEG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. TODAY Text File Enter the path/name of the TODAY Text File. This file is displayed if you have enabled the "TODAY" function. The program TODAY.EXE (or some version thereof) creates thisfile. TODAY.EXE may be run from the $$LOGON.BAT file duringlogon or during an event. If you are running your system under a "frontdoor" you may opt to run the TODAY.EXE from the batch file you start FeatherNet with (SR.BAT). Example: C:\FNET\TODAY (non-graphics file) Example: C:\FNET\TODAYG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. DOWNLOAD WARNING Text File Enter the path/name of the DOWNLOAD WARNING Text File. Thisfile is displayed when a user enters "D" to download a file from the file transfer command prompt. Example: C:\FNET\DOWNWRN (non-graphics file) Example: C:\FNET\DOWNWRNG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. UPLOAD WARNING Text File Enter the path/name of the UPLOAD WARNING Text File. This file is displayed when a user enters "U" to upload a file to the bbs from file transfer command prompt. Example: C:\FNET\UPWARN (non-graphics file) Example: C:\FNET\UPWARNG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. USER STATISTICS Text File Enter the path/name of the USER STATISTICS Text File. This file is displayed when a user logs onto the bbs and when he/she enters the "V" command from the main bbs command prompt. A sample is included with @Xfb macros to display useful user information. to the bbs from file transfer command prompt. Example: C:\FNET\USRSTAT (non-graphics file) Example: C:\FNET\USRSTATG (graphics file) Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. PRIVATE Mail ONLY Enter a "Y" if you want to allow ONLY private (EMAIL) mail to be entered in this conference. If you specify private mail only, users high message read pointers will be updated when they read any waiting mail in a PRIVATE mail ONLY conference. Security Level to List Bulletins Enter the security level (0-255) required to list bulletins. Security Level to Leave a COMMENT Enter the security level (0-255) required to Leave a COMMENT to the Sysop. Security Level For the (D)oor Command Enter the security level (0-255) required to use the "D" command from the MAIN BBS prompt to OPEN a DOOR. Security Level For the (H) HELP Command Enter the security level (0-255) required to use the "H" command from the MAIN, CONFERENCE and FILE TRANSFER prompts to view the system HELP files. Security Level to EDIT User Information Enter the security level (0-255) required to use the "I" command from the MAIN BBS prompt to edit user information. ANY user with at least this security level can edit the PASSWORD, PHONE #'s and CITY/STATE fields of his/her user record. It is recommended you allow ONLY mature users to use this command as it permanently alters the above fields in the user's record in the USERS file. Security Level to (J) JOIN a Conference Enter the security level (0-255) required to use the "J" command to Join a Message Conference. Security Level to View Logged File Directory Enter the security level (0-255) required to use the "L" command from the File Transfer prompt to view the currently LOGGED file directory listing. This is a slightly simpler method of listing a directory when it is the last one you viewed. Security Level to Search for New Files Enter the security level (0-255) required to use the "N" command from the File Transfer prompt to search for new files from a specified (or given) date. Security Level to use the (O) Operator Page Command Enter the security level (0-255) required to use the "O" command from the Main BBS prompt to Page the System Operatorfor a CHAT Session. Security Level to use the (P) Page Length Command Enter the security level (0-255) required to use the "P" command from the Main BBS prompt to adjust the default screen size. Security Level to use the (CALL) Command Enter the security level (0-255) required to use the "CALL" command from the Main BBS prompt to view the CALLER log file. Discretion is recommended. Security Level to use "@" Macros in Messages Enter the security level (0-255) required to use the "@" variables in the message conferences. Many ECHO MAIL networks do not allow the use of these so discretion is strongly recommended. Security Level to READ ALL Messages Enter the security level (0-255) required to use read ALL messages and COMMENTS. It is strongly recommended you reserve this privilege for users you have unquestionable faith in such as a Co-Sysop or business partner. Security Level to EDIT Own Messages Enter the security level (0-255) required for a user to EDIThis/her OWN messages. This command can also be viewed as allowing a user to KILL a message since the entire contents may be discarded. Discretion Recommended. Security Level to Receive UNLIMITED Daily Time Enter the security level (0-255) required for a user to receive unlimited daily time on the system. A user with this privilege has his "time on today" counter automaticallyreset to ZERO (0) each time he/she logs onto the system. Discretion Warranted. Security Level to use the (Q) Questionaire Command Enter the security level (0-255) required to use the "Q" command from the Main BBS prompt to answer the script questionaires. Security Level to (Q/QQ) QuickScan Messages Enter the security level (0-255) required to use the "Q/QQ" commands from the Conference prompt to perform the (Q) Quickscan and (QQ) QuickerScan of messages. Security Level to (S) Set Conference Scans Enter the security level (0-255) required to use the "S" command from the Conference prompt to SET the Conferences to be scanned when using the "*" Global New Mail Read Command. Security Level to (S) Select Color Graphics Enter the security level (0-255) required to use the "S" command from the Main BBS prompt to toggle the color graphics mode (ASCII/ANSI). Security Level to (TP) Change Transfer Protocol Enter the security level (0-255) required to use the "TP" command from the Main BBS and File Transfer prompts to change the default file transfer protocol. Security Level to (V) View Selected Statistics Enter the security level (0-255) required to use the "V" command from the Main BBS prompt to view selected personal statistical information. The information displayed is in a file created by the System Operator. Security Level to (V) View Archives Enter the security level (0-255) required to use the "V" command from the File Transfer prompt to VIEW file archive contents and perform manipulations (R)ead or (D)ownload thereon. Security Level to View the Welcome FIle Enter the security level (0-255) required to use the "W" command from the Main BBS prompt to view the Welcome file. Security Level to use Toggle Expert Mode Enter the security level (0-255) required to use the "X" command to Toggle Expert mode ON/OFF. Security Level for (S/Z) Zippy Directory Search Enter the security level required to use the "S" or "Z" Zippy File directory search to locate any text within the file descriptions. Security Level to use (*) Global New Message Read Enter the security level (0-255) required to use the "*" command from the Conference or Main BBS prompts to perform a GLOBAL new message read scan. Security Level to use (VER) BBS Version Command Enter the security level (0-255) required to use the "VER" command from the Main BBS prompt to list the BBS Version information. Security Level to KILL any Message Enter the security level (0-255) required to KILL any message in any conference on the system. A user with this security level may also: o Edit his/her Security Level field by using the "I" command from the Main BBS Prompt. o Change the (S) Status of any message to/from PUBLIC and RECEIVER ONLY. Allow ONLY a Co-Sysop or VERY CLOSE Associate to use this command. Security Level to EDIT ANY Message Enter the security level (0-255) required to EDIT any message he/she reads. This is another VERY Powerful commandand much discretion is warranted. Allow ONLY a Co-Sysop or VERY Close Associate to use this command. Force Users Into Bulletin Menu at Logon Enter "Y" to force ALL users into the bulletin menu at logonif new or updated bulletins are present since the caller's last logon. Minutes Prior to Event to Disallow Callers Enter the number of minutes prior to the scheduled event time you want to disallow all callers. It is possible for callers to be involved in a file transfer and cause the bbs to miss a scheduled event. Location of User Index Files Enter the DOS path to where the user index files (PCBNDX.x) are located. Enter ONLY the subdirectory where these files will be located. Example: C:\FNET\ Location/name of Conference JOIN Menu Enter the path and name of the file to be displayed to userswhen the "J" command is invoked to JOIN a conference. You can maintain ascii and ansi versions of this file. You may use security level specific menus if desired. No file extension is allowed. Examples: C:\FNET\CONF and C:\FNET\CONF40 In the first example a file called "CONF" is the Join Menu. Note: The graphics version of this file (if used) must have a "G" appended to the file name. Thus, the maximum length of the file name you use must be 7 or fewer characters. In the 2nd example a file called "CONF40" is the Join Menu for security level 40 ONLY users. A graphics version of thesecurity level join menu would be "CONFG40". The "G" is appended immediately after the ascii file name and followed by the security level. Location of "HELP" Directory Enter the sub directory the "HELP" files will be kept in. The files kept in this directory are "special" help files the SYSOP creates for additional help. The users may read them by entering "H <filename>" from the main bbs command prompt. The SYSOP should notify users of these files by bulletin, news, welcome file or menus. This additional helpfunction is ONLY usable from the MAIN bbs command prompt. Example: C:\FNET\HELP\ Location/Name of CoSysop BitMap File Enter the path and name of the CoSysop BITMAP file. This file would generally be located in the bbs home directory. It is conceivable that a Sysop might want to have different Conference Configurations for different nodes. The CoSysop BITMAP's are used to specify which users may be Co-Sysops in a given Conference. If designated as a Co-Sysop for a given conference the user may do the following in that conference: Read ANY Messages Read ANY Messages KILL ANY Messages Example: C:\FNET\COSYSOP.BIT Have the "Do you want Color' question default to "Y" or "N"Enter a "Y" if you want the "Do you want Color Graphics" question at login to default to (Y)es. Enter an "N" to haveit default to (N)o. Rings Before FeatherNet Answers a Call Enter the number of rings (1 - 10) you want before FeatherNet sends the answer command to the modem. Typically, one (1) ring is preferred but some Sysops may want to wait for additional rings. Path and Name of "PWRD" File Enter the complete path and name of the PWRD file to use in this configuration. The PWRD file determines the amount of time per day a user gets based on his/her security level. The format for this file is in the documentation and a sample "PWRD" file is included with the bbs package. Example: C:\FNET\PWRD Path and Name of "RATIO" File Enter the complete path and name of the RATIO file to use inthis configuration. The RATIO file is used to determine thefile transfer ratio (uploads Vs Downloads) a user must maintain. It also specifies the number of bytes per day or the number of files per day the user is allowed to download. This is based on a user's security level. The format for this file is in the documentation and a sample "RATIO" file is included with the bbs package. Example: C:\FNET\RATIO Filename Extension NOT Permitted This file can not have an extension. Its name must be 7 or fewer characters as FeatherNet will add a "G"to the name when searching for the color graphics version of the file. Additionally, if this file is to have security level specific versions the file name *must* be 4 or fewer characters to allow for a "G" added to the graphic version by FeatherNet and three characters available for the security level (0 - 255).