home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
BBS Toolkit
/
BBS Toolkit.iso
/
programs
/
fnet402.zip
/
FNET.DOC
< prev
next >
Wrap
Text File
|
1993-04-10
|
267KB
|
7,473 lines
██████ ██████ ████ ██████ ██ ██ ██████ ██████ ██ ██ ██████ ██████
██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ███ ██ ██ ██
█████ █████ ██████ ██ ██████ █████ ██████ ██████ █████ ██
██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ███ ██ ██
██ ██████ ██ ██ ██ ██ ██ ██████ ██ ██ ██ ██ ██████ ██
FeatherNet Computer Bulletin Board System
Version 4.00
For the IBM-PC XT/AT and Compatibles
Copyright (C) 1988, 1993 Ron Pierce and FeatherNet Software
┌────────────┐
│Introduction│
└────────────┘
FeatherNet is a powerful, full-featured Bulletin Board System (BBS) that
has been designed to meet the needs of a wide range of both sysop and
user requirements.
FeatherNet REQUIRES dos v3.1 or newer and at least an 80286 class cpu is
recommended. Both 8088 (XT/PC) and 80286 (AT) and higher versions are
available. The (AT) version executes faster and requires approximately
10k less ram than the 8088 version. Approximately 239K of RAM is
utilized by the program while operating. Any IBM or 100% compatible
will run FeatherNet well. It is recommended a machine with a large (1
mb min.) disk cache be used for optimum performance. Memory requirements
increase by approximately 100 bytes for each file transfer directory and
by 35 bytes for each file download path configured for a conference.
FeatherNet v4.00 - Page 2
┌────────────┐
│ DISCLAIMER │
└────────────┘
WARNING! I, Ron Pierce, cannot accept any responsibility for loss,
personal or commercial, incurred while operating FeatherNet BBS or
its utilities. You operate FeatherNet BBS at your own risk.
I make no warranty of any kind, express or implied, including without
limitation, any warranties of merchantability and/or fitness for a
particular purpose. I shall not be liable for any damages, whether
direct, indirect, special or consequential arising from a failure of
this program to operate in the manner desired by the user. I shall
not be liable for any damage to data or property which may be caused
directly or indirectly by the use of this program.
IN NO EVENT WILL I BE LIABLE TO YOU FOR ANY DAMAGES,
INCLUDING ANY LOST PROFITS, LOST SAVINGS OR OTHER
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
YOUR USE OR INABILITY TO USE THE PROGRAM, OR FOR ANY
CLAIM BY ANY OTHER PARTY.
Your continued use of this program and any associated utilities confirms
your intention to abide by the licensing agreement.
┌───────────────────────┐
│ LICENSING INFORMATION │
└───────────────────────┘
The FeatherNet Bulletin Board System is the property of FeatherNet Software
and Ron Pierce. FeatherNet BBS is designed to be easy to use and maintain,
and contains a full range of features. Any loss due to your use or misuse
of this program is your responsibility, and no claim of liability can be
held against the software developer, Ron Pierce. Your use of this program
and its utilities constitutes your acceptance of this agreement.
Any reverse engineering or altering of the 'code' in any form is expressly
forbidden and thus illegal.
FeatherNet is Shareware. You may 'test' FeatherNet for a reasonable period
(30 days is considered reasonable) after which time you should
register the program or discontinue its use. For registering, you
are eligible for unlimited support from the FeatherNet BBS. Voice phone
support is available for additional charges. Registration removes the
[UNREGISTERED SHAREWARE] notice at logon. FeatherNet is to be used on one
computer or one networking system (Unlimited Nodes).
The look, see, feel, and structure of this program is uniquely designed.
The programming code this BBS is made of is the copyrighted property of
Ron Pierce and FeatherNet Software.
FEATHERNET COMPUTER BULLETIN BOARD SYSTEM
Copyright (C) 1988, 1993 FeatherNet Software
FeatherNet v4.00 - Page 3
┌────────────────────────┐
│ SHAREWARE DISTRIBUTION │
└────────────────────────┘
FeatherNet BBS Software may be copied freely and distributed globally.
Clubs, user groups and Shareware distributors are authorized to charge
a nominal fee not to exceed $7.50 for the distribution of FeatherNet
BBS.
┌─────────────────────────┐
│ REQUIRED PRE_CONDITIONS │
└─────────────────────────┘
┌─────────────────────────────────────────────────────────────────┐
│ If you are operating in a Network environment ensure SHARE │
│ is loaded prior to starting FeatherNet. This will prevent │
│ 'PERMISSION DENIED' errors during network file access. Place │
│ an entry in your 'AUTOEXEC.BAT' file to load SHARE at boot-up. │
└─────────────────────────────────────────────────────────────────┘
┌──────────────────────────────────────────────────────┐
│ FeatherNet requires MS/PC DOS version 3.1 or newer │
└──────────────────────────────────────────────────────┘
PCBoard is a registered trademark of Clark Development Company
DESQview is copyrighted by Quarterdeck Office Systems
PC-Cache is copyrighted by Multisoft Corporation
FeatherNet v4.00 - Page 4
┌──────────────────┐
│TABLE OF CONTENTS │
└──────────────────┘
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
DISCLAIMER & LICENSING INFORMATION . . . . . . . . . . . . . . . . . . 3
SHAREWARE DISTRIBUTION & REQUIRED PRE-CONDITIONS . . . . . . . . . . . 4
INITIAL SETUP & CONFIGURATION . . . . . . . . . . . . . . . . . . . . 7
FEATHERNET CONFIGURATION UTILITY (FNCFNG.EXE) . . . . . . . . . . . . 8
FILE DIRECTORY INFORMATION . . . . . . . . . . . . . . . . . . . 8
CONFERENCE CONFIGURATION . . . . . . . . . . . . . . . . . . . . 9
GENERAL INFORMATION 1 . . . . . . . . . . . . . . . . . . . . . . 14
GENERAL INFORMATION 2 . . . . . . . . . . . . . . . . . . . . . . 18
MODEM/NODE/SUBSCRIPTION CONFIGURATION . . . . . . . . . . . . . . 21
FILE LOCATIONS #1 . . . . . . . . . . . . . . . . . . . . . . . 24
FILE LOCATIONS #2 . . . . . . . . . . . . . . . . . . . . . . . 27
USER SECURITY LEVELS . . . . . . . . . . . . . . . . . . . . . . 33
SHIFTED FUNCTION KEY ASSIGNMENTS . . . . . . . . . . . . . . . . 38
SAVING THE CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . 39
RUNNING FEATHERNET . . . . . . . . . . . . . . . . . . . . . . . . . . 40
WAIT FOR CALL SCREEN & LOCAL LOGON . . . . . . . . . . . . . . . . . . 41
FUNCTION KEYS & SPECIAL KEY COMBINATIONS . . . . . . . . . . . . . . . 42
MAIN MENU COMMAND SUMMARIES . . . . . . . . . . . . . . . . . . . . . 43
CONFERENCE MENU COMMAND SUMMARIES . . . . . . . . . . . . . . . . . . 45
FILE TRANSFER MENU COMMAND SUMMARIES . . . . . . . . . . . . . . . . . 47
FILE TRANSFER SYSTEM CONTROL FILES . . . . . . . . . . . . . . . . . 49
DIR.LST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
RATIO (DOWNLOAD CONTROL) . . . . . . . . . . . . . . . . . . . . 49
PWRD FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
FSEC FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
UPSEC FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
DIRx FILES (FILE DIRECTORY LISTING FILES) . . . . . . . . . . . . 52
FEATHERNET CONTROL FILES . . . . . . . . . . . . . . . . . . . . . . . 53
FNETPROT.DAT . . . . . . . . . . . . . . . . . . . . . . . . . . 53
FILE FORMATS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
SRCONFIG FILE . . . . . . . . . . . . . . . . . . . . . . . . . . 54
USERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
USERNET.DAT . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
MESSAGE FILES . . . . . . . . . . . . . . . . . . . . . . . . . . 58
PCBOARD.SYS FILES . . . . . . . . . . . . . . . . . . . . . . . . 59
DOOR.SYS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
FNCONF.@@@ . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
FNEXTUSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
EDITING SYSTEM FILES . . . . . . . . . . . . . . . . . . . . . . . . . 63
FNCFG - CHANGEABLE FILES . . . . . . . . . . . . . . . . . . . . 63
EDITING LST FILES . . . . . . . . . . . . . . . . . . . . . . . . 64
BLT.LST FILE . . . . . . . . . . . . . . . . . . . . . . . . . . 65
DIR.LST FILE . . . . . . . . . . . . . . . . . . . . . . . . . . 66
CREATING DIRx FILES . . . . . . . . . . . . . . . . . . . . . . . 67
DOORS.LST . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
REMOTE DOORS . . . . . . . . . . . . . . . . . . . . . . . . . . 69
DLPATH.LST . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
MAKING a FILE DOWNLOADABLE . . . . . . . . . . . . . . . . . . . 71
FeatherNet v4.00 - Page 5
┌─────────────────┐
│TABLE OF CONTENTS│
│ CONTINUED │
└─────────────────┘
SYSOP UTILITIES (FNETSM, FNFILER, LOCALUP, FNPACK, MODEMSET) . . . . . 72
FNETSM.EXE . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
FNETSM OPERATION . . . . . . . . . . . . . . . . . . . . . . . . 73
FNETSM KEY COMBINATIONS . . . . . . . . . . . . . . . . . . . . . 74
FNETSM CONFERENCE REGISTRATIONS . . . . . . . . . . . . . . . . . 74
FNFILER.EXE . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
LOCALUP.EXE . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
FNPACK.EXE . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
MODEMSET.EXE. . . . . . . . . . . . . . . . . . . . . . . . . . . 79
SYSTEM BATCH FILES . . . . . . . . . . . . . . . . . . . . . . . . . . 80
SR.BAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
ARCMxS.BAT . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
MULTIPLE NODE OPERATION . . . . . . . . . . . . . . . . . . . . . . . 82
TIPS AND TROUBLE-SHOOTING . . . . . . . . . . . . . . . . . . . . . . 83
FILES LISTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
.BAT, .COM AND .EXE FILES . . . . . . . . . . . . . . . . . . . . 85
NON EXECUTABLE FILES . . . . . . . . . . . . . . . . . . . . . . 88
FRONT-END LOADER SUPPORT ( i.e.: FRONTDOOR) . . . . . . . . App-A 90
RUNNING UNDER DESQVIEW . . . . . . . . . . . . . . . . . . App-B 91
USING THE 'RINGBACK' MODE . . . . . . . . . . . . . . . . . App-C 95
TEXT MACROS USED IN MESSAGES AND TEXT FILES . . . . . . . . App-D 96
COLOR MACROS USED IN MESSAGES AND TEXT FILES . . . . . . . . App-E 99
ABORTED DOWNLOAD CREDIT . . . . . . . . . . . . . . . . . . App-F 100
RUNNING EVENTS . . . . . . . . . . . . . . . . . . . . . . App-G 101
ALLOWING FREE DOWNLOADS . . . . . . . . . . . . . . . . . . App-H 102
DUPLICATE 'UPLOADS' PROTECTION . . . . . . . . . . . . . . . App-I 103
SHELLING TO FILE TRANSFERS & ARCHIVE MANIPULATIONS . . . . . App-J 104
SCRIPT QUESTIONNAIRE INFORMATION . . . . . . . . . . . . . . App-K 105
PRIVATE (PERSONAL) FILE TRANSFERS . . . . . . . . . . . . . App-L 106
DIRx FILE INDEXING . . . . . . . . . . . . . . . . . . . . App-M 108
FNCHK.EXE - FEATHERNET UPLOAD VERIFICATION UTILITY . . . . . App-N 110
FNCHK.CFG . . . . . . . . . . . . . . . . . . . . . . . 110
FNETTEST.BAT . . . . . . . . . . . . . . . . . . . . . 111
FULL SCREEN MESSAGE EDITOR . . . . . . . . . . . . . . . . . App-O 112
SPLIT SCREEN CHAT MODE . . . . . . . . . . . . . . . . . . . App-P 113
SELECTED FEATHERNET FEATURES . . . . . . . . . . . . . . . . . . . . . 114
SUPPORT & SHAREWARE REGISTRATION . . . . . . . . . . . . . . . . . . . 115
LICENSING AGREEMENT . . . . . . . . . . . . . . . . . . . . . . . . . 116
FeatherNet v4.00 - Page 6
╔═════════════════════════════════╗
║ Initial Setup and Configuration ║
╚═════════════════════════════════╝
You can manually install FeatherNet using the below guidelines. A much
easier method (which you might have already employed) is to run
"instalfn.exe" and let this installation program do 99% of the work for
you. If you have used instalfn.exe you may proceed now to # 4 below.
These instructions assume a general familiarity with DOS commands
1. Create a directory to run FNET from. If using drive 'C' then the
following will create the FNET Main directory.
c:
cd\
md fnet
cd \fnet
2. You are now in the FNET directory. The following files ** MUST **
be located in a sub-directory included in your DOS path (PATH=).
SCROLL.COM
MOVE.COM
FNCFG.EXE
FNCHK.EXE
FNZIPCMT.COM (optional)
DSZ.COM OR DSZ.EXE (Available on most bulletin boards)
PRIVUTIL.EXE
FNFILER.EXE
Use the dos 'COPY' command to put these files in a directory which is
included in your 'PATH=' statement in your 'AUTOEXEC.BAT' file. I
prefer the ROOT directory. A sample command to copy a file from the
'FNET' directory to the ROOT directory follows:
COPY FNCFG.EXE c:\
3. Copy all other files in the FNET archive into the FNET Main directory.
4. Every file you need to run FeatherNet should now be accessible from
the FNET Main Directory. There is a full list and description of all
these files later in this documentation. There are several files in
the FNET directory that warrant a description.
5. Run the program 'FNCFG.EXE' from the FNET NODE directory. Ensure ALL
items are answered. DETAILED INSTRUCTIONS FOLLOW IN THE NEXT
SECTION.
6. Use 'SR.BAT' to operate FNET. The file MUST reside in each NODE
directory and *must* be named "SR.BAT".
Edit ascii files with a text editor and ansi files with an
ansi editor/drawing program. A good ansi editor is TheDraw
which can be found on most computer bulletin boards systems.
Some of the following configuration screens are not full size
in order to improve clarity and reduce the amount of "dead"
space in the documentation. They contain all the text from
actual configuration screens.
FeatherNet v4.00 - Page 7
┌────────────────────────────────────────────────┐
│ FeatherNet Configuration Utility (FNCFNG.EXE) │
└────────────────────────────────────────────────┘
The configuration utility is titled 'FNCFG.EXE'. This program will
assist you in your BBS configuration. Place 'FNCFG.EXE' in your system
file path, ensure the files "FNCFG.HLP" and "FNCFG.NDX" are located in
the subdirectory FNCFG.EXE is located in. Type FNCFG and press <ENTER>.
This will bring you to the FNCFG Main Menu.
╔══════════════════════════════════════════════════════════════════════════╗
║ FeatherNet Configuration Utility v4.00 ║
╠══════════════════════════════════════════════════════════════════════════╣
║ ║
║ ║
║ ║
║ ║
║ ║
║ [A] Conference Information ║
║ [B] General Information #1 ║
║ [C] General Information #2 ║
║ [D] Modem / Node / Subscription Information ║
║ [E] File Locations (1) ║
║ [F] File Locations (2) ║
║ [G] Security Levels ║
║ [H] SHIFTED Function Key Assignments ║
║ ║
║ Use to select, THEN press <ENTER>. ESC exits program! ║
║ ║
║ ║
╠══════════════════════════════════════════════════════════════════════════╣
║ Copyright (C) 1988, 1993 FeatherNet Software ║
╚══════════════════════════════════════════════════════════════════════════╝
The easiest way to illustrate how to configure FeatherNet setup will be
to take you through each screen that you have to navigate in the setup
editor.
┌──────────────────────────┐
│File Directory Information│
└──────────────────────────┘
There can be as many as 999 file transfer directories per conference.
Each directory will have a DIR listing file which contains the file
name, size, date and description for each file on your system available
for downloading by users.
You also define a "public" and "private" upload directory and
corresponding DIR listing file for each.
FeatherNet has excellent file security. You assign a minimum security
level for each download directory configured. Users may list, search
and download from *ONLY* those directories they have adequate security
for.
FeatherNet v4.00 - Page 8
The 1st selection (Conference Information) brings you to this screen.
╔══════════════════════════════════════════════════════════════════════════╗
║ FeatherNet Configuration & Setup Utility v4.00 ║
╚══════════════════════════════════════════════════════════════════════════╝
Conference # to Edit [0-1] (A)= Add Conf. <Q>=Abort <L>=List Confs.:
Your choices are:
(1) Enter the number of a conference to configure/edit.
(2) Enter "A" to add a conference
(3) Enter "Q" to abort to FNCFG's main menu.
(4) Enter "L" to list the available conferences.
Entering "A" or a valid conference number will place you in the
conference configuration editor screen. This allows easy editing of
the information requested by each item in the screen. A description
of each item in the configuration screen begins below the screen.
╒═════════════════════════════════════════════════════════════════════════════╕
│ Editing Conference Configuration # 0 │
│ │
│ Conference Name : MAIN │
│ Message Path/Name : D:\MSG\MSGS │
│ Read Security : 50 │
│ Reply Security : 50 │
│ Write Security : 50 │
│ │
│ Sec Lvl Path/Name Upload DIR File Uploads Location │
│ Pub U/L: 70 : C:\FNET\UPDESC : C:\FNET\UPLOD\ │
│ Priv U/L: 255 : C:\FNET\PRIVATE : C:\FNET\PRIVUL\ │
│ │
│ Menu List FIle Path/Name of List File │
│ Bulletins : C:\FNET\BLT.MEN : C:\FNET\BLT.LST │
│ Doors : C:\FNET\DOORMEN : C:\FNET\DOORS.DAT │
│ Directories : C:\FNET\DIR0 : C:\FNET\DIR.LST │
│ File Download Paths Listing : C:\FNET\DLPATH2.LST │
│ │
│ Directory Index File Name : │
│ Echo this Conf. : N Public Conference : Y Message Blocks : 4 │
│ Private Mail ONLY : N │
│ │
╘═══ 17:13:32 ═══════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF┘
Conference Name
---------------
Enter the name of this conference. It may be up to 25 characters in
length.
Example: Assembly Programming
FeatherNet v4.00 - Page 9
Message File Path/Name
----------------------
Enter the complete file path and file name for this
conference's messages.
Example: C:\FNET\MSGS\MAIN
NOTE: The message file name MUST NOT have a file extension.
There is an accompanying index file created with each
message file. It has a ".NDX" file extension appended to
the name of the message file.
Read Security
-------------
Enter the security level required to read messages in this
conference. (0-255). This setting along with the USERS'
security level allows you to control access to conferences.
Reply Security
-------------
Enter the security level required to reply to a message
after reading it. (0-255). This setting along with the
USERS' security level allows you to limit a user to being
able to read messages but not being able to reply to a
message after reading it.
Write Security
-------------
Enter the security level required to enter a new message
0-255). This setting along with the USERS' security level
allows you to control the privilege of writing messages.
PUBLIC Upload Security Level
----------------------------
Enter the security level required to view/search the PUBLIC
upload listing file and download files contained in the PUBLIC
upload directory. The security level may be 0-255.
PUBLIC Upload Listing File
--------------------------
Enter the complete path and name for the PUBLIC upload listing
file. This file contains the descriptions for newly uploaded files.
Example: C:\FNET\UPDESC
PUBLIC Upload File Path
-----------------------
Enter the PUBLIC UPLOAD file path. This is the DOS
directory which new uploads will be kept in after being
uploaded. Note that all files are RECEIVED in the NODE work
directory then PUBLIC uploads are moved to this directory
after being tested/verified.
Example: C:\FNET\UPLOD
FeatherNet v4.00 - Page 10
PRIVATE Upload Security Level
-----------------------------
Enter the security level required to view/search the PRIVATE upload
listing file and download files contained in the PRIVATE upload
directory. The security level may be 0-255.
PRIVATE Upload Listing File
---------------------------
Enter the complete path and name for the PRIVATE upload listing file.
This file contains the descriptions for newly uploaded files.
Example: C:\FNET\PRIVDESC
PRIVATE Upload File Path
------------------------
Enter the PRIVATE upload file path. This is the DOS directory which
new uploads will be kept in after being uploaded. Note that files are
RECEIVED in the NODE work directory then PRIVATE uploads are moved to
this directory after being tested/verified.
Example: C:\FNET\PRIVUL
BULLETIN Menu FIle
------------------
Enter the path and name for the Bulletin Menu file for this
conference. You may share the same file for both ascii and
ansi versions if you use wish.
Example: C:\FNET\BLTMEN
BULLETIN List File
------------------
Enter the path and name for the Bulletin Listing file for
this conference.
Example: C:\FNET\BLT.LST
DOOR Menu FIle
--------------
Enter the path and name for the Door Menu file for this
conference. You may share the same file for both ascii and
ansi versions if you use wish.
Example: C:\FNET\DOORMEN
DOOR List File
--------------
Enter the path and name for the Door Listing file for this
conference.
Example: C:\FNET\DOORS.DAT
FeatherNet v4.00 - Page 11
Menu for Directory Listings
---------------------------
Enter the path and name of the menu file for this
conference's directory listings.
Example: C:\FNET\DIR0
Directory Listing Control File for this Conference
Enter the Directory Listing File to use with this
conference. Assigning a directory listing file to a
conference enables file transfers within a conference.
Users with proper security level may use the "F" command
after joining the conference and perform file transfer
functions on the files available.
Example: C:\FNET\DIR.LST
Download Paths Listing File
---------------------------
Enter the path and name of the file which will contain the
paths to the files available for downloading in this
conference. This file may be shared by other conferences to
allow users to download from other conferences. A popular
configuration is to define one download path file and use it
for each conference.
Example: C:\FNET\DLPATH.LST
Index File Name
---------------
Enter the path and name of the INDEX file to use (if any)
for locating files available for downloading within this
conference. This feature is usually desired ONLY if you
utilize a CD-ROM for storage of download files due to the
slow seek times they have.
If you enter a path and name for this entry, ONLY the index
file will be accessed to locate files. You should ensure
you have properly created an index file which includes all
the possible paths to files in this conference (less the
UPLOAD and PRIVATE UPLOAD directories).
Example: C:\FNET\INDEX\INDEX_1
Echo This Conference
--------------------
"ECHO" refers to a conference's messages being connected
to other systems via a netmail or relay mail network.
Enter a "Y" if you wish to echo this conference or an "N"
if you do not desire to echo it.
FeatherNet v4.00 - Page 12
Make this a PUBLIC Conference
-----------------------------
A public conference is one that any user may join provided
his security level is sufficient.
A private conference is one in which the Sysop MUST grant
access to individual users with the FeatherNet User Editor
(FNETSM). A user MUST have the required security level to
join a private conference as well.
Message Blocks
--------------
Enter the number of message blocks to allocate to this
conference (1-4). Each message block allows up to 1024
messages to be contained in the message file for a given
conference. The maximum number of message blocks is
4 which allows up to 4096 messages for a conference.
PRIVATE Mail ONLY
-----------------
Enter a "Y" if you want to allow ONLY private (EMAIL) mail
to be entered in this conference. If you specify private
mail only, users high message read pointers will be updated
when they read any waiting mail in a PRIVATE mail ONLY
conference.
┌──────┐
│ Note │
└──────┘
FeatherNet no longer directly supports conference deletions. If you
want to delete a conference it is recommended you just make it
inaccessible by making it a PRIVATE conference and raising the
security level to 255. In the conference join menu (conference
listings file) change the conference name to "Not in Use" or
"Reserved" or some other appropriate title. It is anticipated a
conference deletion "utility" program will be forthcoming.
An enormous amount of "work" is required to "delete" a conference
from the configuration. This is due to the users' message pointers
and flags having to be rewritten to reflect the conference
deletion.
This is why "disabling" a conference is presently considered a more
appropriate means of "removing" a conference.
FeatherNet v4.00 - Page 13
This screen allows editing of the General BBS Configuration
information. It is 1 of 2 screens for General Information.
╒═════════════════════════════════════════════════════════════════════════════╕
│ General Information #1 │
│ │
│ Name of Your BBS : The Programmer's Inn │
│ Sysop's name : RONNIE PIERCE │
│ Enable the `TODAY' function : Y │
│ Enable Script Questionaires : Y │
│ Number of Questionaires : 1 │
│ │
│ EVENT bat file (Blank if none) : │
│ Time to run event (HH:MM) : │
│ Minutes prior to stop callers : 10 │
│ │
│ Registration Number : 000 │
│ Add CUSTOM Zip Comments to U/L : Y │
│ Min U/L Drive Space (KBytes) : 500 │
│ Maximum Msgs to capture : 800 │
│ Add 'Uploaded by' to desc. : Y │
│ Mins before recycling to dos : 0 │
│ Use graphics in local logon : Y │
│ Time credit for uploads : 1.50 │
│ Limit Sysop Chat Availability : Y │
│ Sysop Page Start Time: 00:00 Sysop Page Stop Time: 23:59 │
│ │
╘═══ 06:37:36 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF ═╛
BBS Name:
---------
Enter the name of your Bulletin Board. This name is displayed
to all callers at logon.
System Operator
---------------
Enter the name of the system operator. This name should have
an account in the USERS file.
"Today" function
----------------
Enter a "Y" to enable the TODAY function. This function also
requires that you have the event function enabled. You must
have the file "today23.exe" (or some other version of this
file). You must create two files with your today program. (1)
Today.txt and (2) todayg.txt. Ensure thses files are created
in your main bbs directory.
Enable Questionaires
--------------------
Enter a "Y" if you wish to enable script questionaires or
enter an "N" to disable the questionaire function.
FeatherNet v4.00 - Page 14
Number of Questionnaires
------------------------
Enter the number of questionnaires available for users. If
you enabled script questionnaires, this value must be at least
1.
EVENT Batch File
----------------
Enter the name of the EVENT batch file. The name MUST NOT
have a '.BAT' extension. FeatherNet will add the extension
when the EVENT is run.
Time to Run EVENT
-----------------
Enter the time (in Military Format) when the EVENT should be
run. This is based on a 24 hour clock where 4:30 am would be
04:30 and 10:00 pm would be 22:00. It is strongly recommended
that your EVENT NOT be run near midnight (24:00) to avoid the
possibility of a conflict with the computer clock.
Minutes Prior to Event to Disallow Callers
------------------------------------------
Enter the number of minutes prior to the scheduled event time
you want to disallow all callers. It is possible for callers
to be involved in a file transfer and cause the bbs to miss a
scheduled event.
Registration Number
-------------------
Enter the bbs registration number given you when you have
paid the ShareWare registration fee for the bbs.
If you have not registered FeatherNet enter "0" as your
registration number until you have decided to register.
Add Custom 'ZIP' Comments
-------------------------
Enter 'Y' if you wish uploads to receive 'CUSTOM' zip
comments. If you do not wish to add zip comments, you MUST
enter 'N'.
NOTE: To add zip comments, you MUST set an environment
variable. It should be 'SET FNZIPCMT=path\name' where
path\name is the DOS path and file name of the file containing
the zip file comment (ie. SET FNZIPCMT=C:\FNET\ZCMT.FIL). If
FNZIPCMT can't find this file it will abort and set a DOS
errorlevel of 1.
FeatherNet v4.00 - Page 15
Here is my 'C:\FNET\ZIP.FIL' (Zip Comment Header)
┌────────────────────────────────────────────────────┐
│ The Programmer's Inn │
│ Sysop: Ron Pierce - the Programmer! │
│ >>> Home of FeatherNet Bulletin Board System <<< │
└────────────────────────────────────────────────────┘
You may name this any path\filename you wish as long as the
SET command in your AUTOEXEC.BAT file points to it.
NOTE: To manually add zip comments to files already on your
system, run FNZIPCMT from the directory where the ZIP files
are located and it will automatically add/change the zip
comments of all files in the directory.
Minimum Upload Drive Space (KBytes)
-----------------------------------
Enter the number of kbytes which must be free on your upload
drive before an upload is permitted. This number entered is
multiplied by 1024 to get the actual number of bytes that must
be free.
Maximum Number of Messages to Capture
-------------------------------------
This value determines the maximum number of messages that can
be archived into the capture file.
Keep in mind that the captured messages are processed in the
work directory. If the work directory is a ram disk it could
fill up and the capture command will fail.
Add 'Uploaded By' to Description
--------------------------------
Enter 'Y' if you want FeatherNet to append 'Uploaded By: ' and
the caller's name to the file description after each upload.
Minutes Before FeatherNet Recycles
----------------------------------
Enter the number of minutes before FeatherNet will terminate
and allow the "SR.BAT" file to re-load the bbs and reset the
modem when waiting for a call.
This is available due to some modems become "DEAD" after a
period of being idle. This is generally only necessary if
running under an emulated multitasker such as DESQVIEW.
Use Color Graphics during a Local Logon
---------------------------------------
Enter 'Y' if you wish FNET to use ansi color in a local logon.
Color may be turned off/on at the main menu with the 'S'
command irrespective of this setting.
FeatherNet v4.00 - Page 16
Time credit For Uploads
-----------------------
Enter the amount of on-line time credited to a user for
uploading files. This number may have 2 decimal places. A
credit of '0' will charge the user for actual time used during
the upload with no 'extra' credit given. A credit of 1.0 will
make the time of the upload 'free' time. More than 1.0 will
result in additional on-line time.
NOTE: It is a nice perk for callers to gain 'extra' time
through uploads.
Limit Sysop Paging Hours
------------------------
This allows you to disable the hours the sysop is available
for chat. If this options is selected to "N" then users may
page the sysop at any time provided the sysop has the chat
page turned on.
Sysop Page Start Time
---------------------
When the Sysop Page is turned Off the Sysop cannot be Paged.
When Sysop Page is turned ON this field is the Start time at
which callers may page the Sysop for chat. If you are only
available from 17:00 until 22:00 you might want to use these
times as the chat page start and stop times.
Sysop Page Stop Time
--------------------
When the Sysop Page is turned OFF the Sysop cannot be Paged.
When Sysop Page is turned on this field is the Stop time at
which callers are not permitted to page the Sysop for chat. If
you are only available from 17:00 until 22:00 you might want
to use these times as the chat page start and stop times.
FeatherNet v4.00 - Page 17
╒════════════════════════════════════════════════════════════════════════════╕
│ General Information #2 │
│ │
│ │
│ Warn callers at logoff if 'flags' set: Y │
│ Ask to set message pointers at logoff: Y │
│ │
│ Swap out FeatherNet when Shelling : Y │
│ │
│ Allow (P)rivate File Transfers : Y │
│ │
│ Allow Split Screen Chat to be used : Y │
│ │
│ Always Force Users to Select Protocol: N │
│ │
│ Disable the auto ANSI detect at logon: N │
│ │
│ Allow 'Aliases' or Single-Word names : N │
│ Allow 'SYSOP' to logon from Remote : N │
│ Max lines allowed read from archive : 1010 │
│ │
│ Force Users to Bltn Menu if New Bltns: Y │
│ │
╘═══ 06:45:02 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Warn Callers at logoff if 'Download Flags' are Set
--------------------------------------------------
Enter 'Y' if you wish to prompt users at logoff who have files
flagged for download. This will give them a chance to
download the files before the flags are 'reset' after logoff.
Prompt callers to set Message Pointers at Logoff
------------------------------------------------
Enter "Y" if you desire to have the callers asked if they want
their 'high' message read flags to be set to the highest
message in each conference defined for the bbs.
The advantage of setting the high message read pointer to the
highest message in each conference is that callers who usually
only read private mail will keep their high message read
updated. A user reading private mail or public mail addressed
to him during the logon sequence does not get the message read
pointers updated.
Swap FeatherNet to XMS, EMS, or Disk During a 'SHELL'
-----------------------------------------------------
FeatherNet 'SHELLS' to DOS when the Sysop presses the F9 key
or when running FNCFG.EXE, FNETSM.EXE , or FNFILER.EXE from
within the bbs. SHELLing is also performed when file
transfers or archive manipulations are performed.
Entering a "Y" will cause FeatherNet to attempt to SWAP itself
to Extended Memory (supplied by an XMS driver, such as
HIMEM.SYS), expanded memory (EMS version 4.0), or disk, thus
freeing up more memory for DOS.
FeatherNet v4.00 - Page 18
If attempts to swap using all three methods fail then
FeatherNet will SHELL while remaining in DOS memory.
Allow (P)rivate File Transfers
------------------------------
Enter "Y" if you wish to allow certain users the ability to
upload and download PRIVATE files. A user may only send
private files to another user who is authorized this function
by the sysop.
Allow the Use of Split-Screen Chat Mode
---------------------------------------
Enter a "Y" if you want the Split Screen Chat mode available
to callers with ANSI capability detected at logon. The Split
Screen Chat mode allows the simultaneous sending and receiving
of data thus increasing the efficiency of the chat mode.
Force all Users to Select File Transfer Protocol
------------------------------------------------
Enter a "Y" to force all users to select the file transfer
protocol after they enter a "D" or "U" from the file transfer
area. Users taking advantage of the "command stacking"
feature will not be forced to select a protocol.
Disable the Auto ANSI Detect Function at Logon
----------------------------------------------
Some networks apparently have trouble dealing with the ANSI
status request ("n") and this option allows the sysop to
completely disable the ANSI detection at logon. Disabling the
auto ANSI will mean ALL users will not have the quicker ansi
cursor movement sequences available unless they are using the
Visual Message Editor. Ensure the "apparent problem" with the
auto ANSI detect sequence is not unique to one user which may
be a configuration problem. If you disable Auto ANSI you also
disable the split screen chat mode.
Allow "Aliases" or One-Name Users
---------------------------------
Enter a "Y" if you want to allow users to logon with Aliases
or with one Name. All user names must begin with letters
between A..Z
Allow the "SYSOP" to Logon Remotely
-----------------------------------
Enter a "Y" if you want to allow the user named "SYSOP" to
logon remotely. If you do so, ensure the password you have
assigned this user record is VERY unique.
FeatherNet v4.00 - Page 19
Maximum Lines to Display When Reading From Archive
--------------------------------------------------
Enter the maximum number of lines users will be allowed to
read when performing archive manipulations. This allows the
Sysop to prevent users from capturing complete text files and
bypassing download byte limitations.
Force Users Into Bulletin Menu at Logon
---------------------------------------
Enter "Y" to force ALL users into the bulletin menu at logon
if new or updated bulletins are present since the caller's
last logon.
FeatherNet v4.00 - Page 20
╒════════════════════════════════════════════════════════════════════════════╕
│ Modem / Node / Subscription Information │
│ │
│ Modem Initialization String : ATZ │
│ Comm Port (0 - 4) : 1 │
│ Baud rate to open comm port at : 38400 │
│ Lock Comm Port at opening baud : Y Answer on Ring # 1 │
│ Seconds to wait for CONNECT : 55 │
│ Minimum Baud rate Allowed : 1200 │
│ Pause 3 seconds after CONNECT : N │
│ │
│ Operate in a Subscription mode : N │
│ Default New User Subscription in Days : 0 │
│ Days before subs. expired to warn : 0 │
│ Expired subscription security lvl : 0 │
│ │
│ Operate in a 'RingBack' Mode : Y │
│ Seconds to Wait For 'Ring Back' : 60 │
│ │
│ Number of this node (1 - 99) : 1 │
│ Nodes on your system (1 - 99) : 1 │
│ Filter all high ascii characters: N │
│ Using a 'front-end' to load FNET: N │
╘═══ 06:45:04 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Modem Initialization String
---------------------------
Enter the initialization string for your modem. This will
vary from one modem to another depending on the modem's
characteristics.
A general string for all modems is:
ATE0Q0M1V1S0=0S2=1S7=45&C1&D2H0
Comm Port (0-4)
---------------
Comm ports 0-4 are directly supported. FeatherNet also allows non-standard
serial port addresses and IRQ's to be defined. If you use a serial port
higher than #2 then ensure you include the correct IRQ and port address.
For serial port #3 "&H3F8" would normally be the port address and "&H4"
would normally be the IRQ number.
Note that FeatherNet "probably" supports serial ports higher than 4 but
this has not been tested.
Note: For a Local Node without a modem/serial port you MUST specify comm
port 0 (zero) in the configuration.
Open Baud Rate (300-115200)
---------------------------
Enter the speed to open your modem at. This will usually be
the highest speed your modem can handle.
Typical examples are: 300, 1200, 2400, 4800, 9600, 19200,
38400, 57600
FeatherNet v4.00 - Page 21
Lock Comm Port at Opening Baud Rate
-----------------------------------
Enter 'Y' if you wish to LOCK the computer to modem speed at
the OPENING baud rate. If you do so, it is assumed that
RTS/CTS is enabled in your modem initialization. If your
modem has a maximum speed of 2400, you will normally answer
'N' to this question. NOTE: Some DOORS do not function well
with locked ports. If you have any problems with a DOOR under
locked ports, you might try UNLOCKING the port.
Answer on Which Ring
--------------------
Enter the "ring" number you want the modem to answer on.
Seconds to Wait for CONNECT
---------------------------
Enter the number of seconds the bbs should wait for carrier
after it has issued the answer command to the modem. Some
modems, particularly high-speed types with the v.32bis
standard, have long carrier detection handshakes. If you have
one of these modems, ensure that this value is set to at least
45 seconds.
Minimum Baud Rate Allowed
-------------------------
Enter the minimum baud rate acceptable on your BBS. Callers
with lower baud rates will be notified that their baud rate is
not supported and logged off immediately.
Pause for 3 Seconds after CONNECT at 2400 or Less Baud
------------------------------------------------------
Enter a "Y" if the bbs should pause for 3 seconds after a
CONNECTION is established at 2400 or less baud. Some modems
take longer than others in detecting the baud rate.
As a rule of thumb if there is a 2-4 second delay from the
time the modem establishes a connection until the 'CONNECT'
message is reported then you should answer "Y" here.
Operate in a Subscription Mode
------------------------------
Enter 'Y' if you want to operate your BBS in a paid
subscription mode. When a subscription expires, FeatherNet
will reduce the caller's security level to the 'expired' level
(chosen below). New users receive 5 days when they logon if
subscription mode is in effect.
Default New User Subscription in Days
-------------------------------------
Enter the number of days you want new users to have until
their subscription is expired. This may now be 0 - 999 days.
FeatherNet v4.00 - Page 22
Days Warning Before Subscription Expires
----------------------------------------
A warning notice will be displayed to usera whose subscription
will expire within the number of days entered.
Expired Subscription Security Level
-----------------------------------
Enter the security level assigned to users when their
subscription expires.
Operate in a RingBack Mode
--------------------------
Enter 'Y' if you wish FNET to operate in 'ringback' mode.
This is handy when only one phone line is available and you
wish FNET and the 'rest of the family' to share it without a
hassle.
When enabled, FNET is initialized by but will not answer a
first call and awaits a second call (ringback) within a
specified period of time as noted below. If a ringback occurs
in the proper time frame, FeatherNet will then answer this
second call.
Seconds to Wait for RingBack
----------------------------
Enter the number of seconds FNET will wait for the 'ringback'
call if operating in ringback mode. 45 - 60 are suggested
values. If a ringback does not occur within the 'set' time,
the 'ringback' is canceled and the BBS awaits another initial
ring.
Node Number
-----------
Enter the node number you are configuring. If you have a
single node BBS, this value should be set to 1.
Total Number of Nodes on Your System
------------------------------------
Enter the total number of nodes you have configured on your
system. This allows FeatherNet to limit the number of entries
in the "UserNet.Dat" file to the exact number of nodes in
operation. You must ensure ALL nodes have the same number for
nodes configured.
Enable High Ascii Filter
------------------------
Enter 'Y' if you wish FeatherNet to filter all ascii
characters above # 127. These are normally associated with
line noise. If your BBS has foreign (non U.S.A.) callers, you
might want to leave this option OFF ('N')
FeatherNet v4.00 - Page 23
Using a 'Front-End' Loader
--------------------------
Enter 'Y' if you want to use a 'front-end' loader to load FeatherNet when a
call is received. The following parameters are used to determine the
caller's baud rate and type of connection.
/C:0 (Local Logon); /C:1 (300 baud); /C:2 (1200 baud); /C:3 (2400 baud)
/C:4 (4800 Baud); /C:5 (9600 baud); /C:6 (12000 baud); /C:7 (14400 Baud)
/C:8 (Sysop Logon to Main Menu)
If a caller connects using an error correcting modem (to your error
correcting modem) '/ERR' is also passed.
Any baud rate may be passed to FeatherNet by using the baud rate on the
command line as in: /C:2400 /C:9600 /C:14400 etc...
FeatherNet v4.00 - Page 24
╒════════════════════════════════════════════════════════════════════════════╕
│ File Locations (1) │
│ │
│ Location of MAIN BBS directory : H:\FN40 │
│ │
│ Location of Work Directory : I:\WORK\ │
│ │
│ Node Home Directory : H:\FN40 │
│ │
│ Location of security level files : C:\FNET\SECMSG\ │
│ │
│ Duplicate u/l 'hold' directory : C:\FNET\UPLOD\HOLD\ │
│ │
│ File to run before/after transfer : │
│ │
│ (P)rivate Files Directory Path : C:\FNET\PRIV\ │
│ │
│ Location/Name of 'FNETTEXT' file : I:\FNETTEXT │
│ │
│ Location of user index files : C:\FNET\ │
│ │
│ Location of HELP files : C:\FNET\ │
│ │
╘═══ 14:22:24 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Main Bulletin Board Directory
-----------------------------
Enter the Main directory for your BBS. This directory may be
shared by a NODE. Example: C:\FNET
Work Directory
--------------
Enter the work directory for this NODE. This directory MUST
be unique to this NODE and NO permanent files should ever be
stored in this directory. The contents of this directory are
purged each call. Safeguards prohibit you from selecting a
BBS NODE or MAIN DIRECTORY as the work directory.
NOTE: A RAM disk (at least 1 mb) will greatly speed up the
'work' done in this directory but will limit your uploads to
the size of the RAM disk.
Node Home Directory
-------------------
Enter the DOS drive / directory which this Node is to be
operated from. It may be the same as the main BBS directory
provided no other Node is already sharing the main BBS
directory.
Example Node Directory: C:\FNET\NODE1
FeatherNet v4.00 - Page 25
Location of Security Level Files
--------------------------------
Enter the drive / directory where security level specific
logon information files are located.
Example: C:\FNET\SECMGG\
These files MUST be named according to the security level for
which they are intended and will be displayed during the logon
sequence.
Example file names: '10' '30' '50' '115' '255' (no
quotes)
NOTE: An example of a security level message would be a brief
disclaimer regarding policies/procedures displayed to
new callers.
Duplicate Upload 'Hold' Directory
---------------------------------
Enter the drive / directory where all uploaded files that
duplicate files already in the 'upload directory' should be
moved to.
This prevents a user from causing a file in the 'upload'
directory to be overwritten by a file with the same name.
Example: C:\FNET\DUPES\
File to run before/after transfer
---------------------------------
Enter the FULL path and name of a batch file to execute when a
file transfer (upload or download) is performed. This can
allow you to do anything your system might need to do prior to
a file transfer.
Example: C:\FNET\XFERBAT.BAT
Location of the PRIVATE File Transfer File Directory
----------------------------------------------------
Enter the Complete DOS Directory Path to the (P)rivate file
transfer directory. This directory will contain PRIVATE files
authorized users send to other authorized users.
Example: C:\PRIVIT\
Path and name of "FNETTEXT" File
--------------------------------
Enter the full dos path and file name for the 'FNETTEXT' file.
This option allows you to utilize a RAM drive for faster
access to the file and less wear and tear on your hard disk
drive.
Example: C:\FNET\FNETTEXT
FeatherNet v4.00 - Page 26
Location of User Index Files
----------------------------
Enter the DOS path to where the user index files (PCBNDX.x)
are located. Enter ONLY the subdirectory where these files
will be located.
Example: C:\FNET\
Location of Special "HELP" Files
--------------------------------
Enter the sub directory the "HELP" files will be kept. The
files in this directory are "special" help files the SYSOP
creates for additional help. The users may read them by
entering "H <filename>" from the main bbs command prompt. The
SYSOP should notify users of these files by bulletin, news,
welcome file or menus. This additional help function is ONLY
usable from the MAIN bbs command prompt.
Example: C:\FNET\HELP\
╒════════════════════════════════════════════════════════════════════════════╕
│ FIle Locations (2) │
│ │
│ Loc/name of MAIN MENU File : C:\FNET\MAINMEN │
│ Loc/name of CONFERENCE Command MENU: C:\FNET\CONFMEN │
│ Loc/name of CONFERENCE Join Menu : C:\FNET\CONF │
│ Loc/name of FILE TRANSFER MENU File: C:\FNET\XFERMEN │
│ Loc/name of SCRIPT QUESTION MENU : C:\FNET\SCRIPT │
│ Loc/name of LOGON File : C:\FNET\LOGON │
│ Loc/name of NEWS File : C:\FNET\SRWELC1 │
│ Loc/name of WELCOME File : C:\FNET\SRWELC │
│ Loc/name of NEWUSER File : C:\FNET\NEWUSER │
│ Loc/name of CLOSED BBS File : C:\FNET\CLOSED │
│ Loc/name of CALLER LOG File : C:\FNET\CALLER1 │
│ Loc/name of EXPIRED Warning File : C:\FNET\EXPWARN │
│ Loc/name of EXPIRED File : C:\FNET\EXPIRED │
│ Loc/name of New User Script File : C:\FNET\SCRIPT.0 │
│ Loc/name of LOGOFF File : C:\FNET\BYE │
│ Loc/name of 'TODAY' File (if used) : I:\TODAY\TODAY │
│ Loc/name of DOWNLOAD Warning File : C:\FNET\DOWN.WRN │
│ Loc/name of UPLOAD Warning File : C:\FNET\UPLOAD.WRN │
│ Loc/name of USER Statistics File : C:\FNET\USRSTAT │
│ Loc/name of CoSysop BITMAP File : C:\FNET\COSYSOP.BIT │
╘═══ 14:22:37 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
MAIN Menu FIle
--------------
Enter the path/name of the Main Menu Text File. This is the
file users see at the main bbs command prompt when in
non-expert mode or when they enter the "?" command at the main
bbs command prompt.
Example: C:\FNET\MAINMEN (non-graphics file)
Example: C:\FNET\MAINMENG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
FeatherNet v4.00 - Page 27
CONFERENCE Command Menu File
----------------------------
Enter the path/name of the Conference Menu Text File. This is
the file users see at the conference command prompt when in
non-expert mode or when they enter the "?" command at the
conference command prompt.
Example: C:\FNET\CONFMEN (non-graphics file)
Example: C:\FNET\CONFMENG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
Location/name of Conference JOIN Menu Page 1 of 2
-------------------------------------
Enter the path and name of the file to be displayed to users
when the "J" command is invoked to JOIN a conference. You can
maintain ascii and ansi versions of this file. You may use
security level specific menus if desired. No file extension
is allowed.
Examples: C:\FNET\CONF and C:\FNET\CONF40
In the first example a file called "CONF" is the Join Menu.
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of the
file name you use must be 7 or fewer characters.
In the 2nd example a file called "CONF40" is the Join Menu for
security level 40 ONLY users. A graphics version of the
security level join menu would be "CONFG40". The "G" is
appended immediately after the ascii file name and followed by
the security level.
FILE TRANSFER Menu File
-----------------------
Enter the path/name of the File Transfer Menu Text File. This
is the file users see at the File Transfer command prompt when
in non-expert mode or when they enter the "?" command at the
File Transfer command prompt.
Example: C:\FNET\XFERMEN (non-graphics file)
Example: C:\FNET\XFERMENG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
FeatherNet v4.00 - Page 28
SCRIPT Questionaire Menu File
-----------------------------
Enter the path/name of the Script Questionaire Menu Text File.
This is the file users see after entering "Q" from the main
memu to list the available questionaires to answer.
Example: C:\FNET\SCRIPT (non-graphics file)
Example: C:\FNET\SCRIPTG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
LOGON Text File
---------------
Enter the path/name of the Logon Text File. This file is
displayed at logon immediately after a user selects to use
graphics mode or non-graphics mode.
Example: C:\FNET\LOGON (non-graphics file)
Example: C:\FNET\LOGONG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
NEWS Text File
--------------
Enter the path/name of the News Text File. This file is
displayed at logon immediately after a user enters his/her
password. It is ONLY displayed if the file date/time is more
recent that the date/time of the caller's last use of the bbs.
Example: C:\FNET\NEWS (non-graphics file)
Example: C:\FNET\NEWSG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
WELCOME Text File
-----------------
Enter the path/name of the Welcome Text File. This file is
displayed at logon immediately after the NEWS file.
Example: C:\FNET\WELCOME (non-graphics file)
Example: C:\FNET\WELCOMEG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
FeatherNet v4.00 - Page 29
NEWUSER Text File
-----------------
Enter the path/name of the NEWUSER Text File. This file is
displayed to NEW users after they fill in the registration
questions and the new registration questionaire.
Example: C:\FNET\NEWUSER (non-graphics file)
Example: C:\FNET\NEWUSERG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
CLOSED Text File
----------------
Enter the path/name of the CLOSED Text File. This file is
displayed to NEW callers if the bbs is operated in a "CLOSED"
mode. Unregistered callers will be allowed to answer the new
registration questions. Then this file will be displayed and
the users logged off.
Example: C:\FNET\CLOSED (non-graphics file)
Example: C:\FNET\CLOSEDG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
CALLER LOG File
---------------
Enter the path/name of the CALLER log. This file contains
information about what each user on the system does or
attempts to do.
Example: C:\FNET\CALLER.LOG
Note: There is no graphics version of this SYSTEM file.
EXPIRED WARNING Text File
-------------------------
Enter the path/name of the EXPIRED WARNING Text File. This
file is displayed at logon if the bbs is run in a subscription
mode and the user's expiration is within the number of days
specified in the modem/subscription/node configuration.
Example: C:\FNET\EXPWARN (non-graphics file)
Example: C:\FNET\EXPWARNG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
FeatherNet v4.00 - Page 30
EXPIRED Text File
-----------------
Enter the path/name of the EXPIRED Text File. This file is
displayed at logon if the bbs is run in a subscription mode
and the user's account is expired.
Example: C:\FNET\EXPIRED (non-graphics file)
Example: C:\FNET\EXPIREDG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
NEWUSER Script File Name
------------------------
Enter the path/name of the NEWUSER registration questionaire.
This is presented a new user after he/she completes the bbs'
new user registration edits.
Example: C:\FNET\SCRIPT.0
LOGOFF Text File
----------------
Enter the path/name of the LOGOFF Text File. This file is
displayed at logoff after a user enters the "G" command to log
off the system.
Example: C:\FNET\BYE (non-graphics file)
Example: C:\FNET\BYEG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
TODAY Text File
---------------
Enter the path/name of the TODAY Text File. This file is
displayed if you have enabled the "TODAY" function. The
program TODAY.EXE (or some version thereof) creates this file.
TODAY.EXE may be run from the $$LOGON.BAT file during logon or
during an event. If you are running your system under a
"frontdoor" you may opt to run the TODAY.EXE from the batch
file you start FeatherNet with (SR.BAT).
Example: C:\FNET\TODAY (non-graphics file)
Example: C:\FNET\TODAYG (graphics file)
FeatherNet v4.00 - Page 31
DOWNLOAD WARNING Text File
--------------------------
Enter the path/name of the DOWNLOAD WARNING Text File. This
file is displayed when a user enters "D" to download a file
from the file transfer command prompt.
Example: C:\FNET\DOWNWRN (non-graphics file)
Example: C:\FNET\DOWNWRNG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
UPLOAD WARNING Text File
------------------------
Enter the path/name of the UPLOAD WARNING Text File. This
file is displayed when a user enters "U" to upload a file to
the bbs from file transfer command prompt.
Example: C:\FNET\UPWARN (non-graphics file)
Example: C:\FNET\UPWARNG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
USER STATISTICS Text File
-------------------------
Enter the path/name of the USER STATISTICS Text File. This
file is displayed when a user logs onto the bbs and when
he/she enters the "V" command from the main bbs command
prompt. A sample is included with @Xfb macros to display
useful user information. to the bbs from file transfer command
prompt.
Example: C:\FNET\USRSTAT (non-graphics file)
Example: C:\FNET\USRSTATG (graphics file)
Note: The graphics version of this file (if used) must have a
"G" appended to the file name. Thus, the maximum length of
the file name you use must be 7 or fewer characters.
Location/Name of CoSysop BitMap File
------------------------------------
Enter the path and name of the CoSysop BITMAP file. This file
would generally be located in the bbs home directory. It is
conceivable that a Sysop might want to have different
Conference Configurations for different nodes.
The CoSysop BITMAP's are used to specify which users may be
Co-Sysops in a given Conference. If designated as a Co-Sysop
for a given conference the user may do the following in that
conference: EDIT ANY Messages, Read ANY Messages, KILL ANY
Messages
Example: C:\FNET\COSYSOP.BIT
FeatherNet v4.00 - Page 32
╒════════════════════════════════════════════════════════════════════════════╕
│ User Security Levels │
│ │
│ A) Archive Mail : 70 Q) Script Questionaires : 50 │
│ B) View Bulletins : 50 Q/QQ) Quick Msg Scans : 50 │
│ C) Comment to Sysop : 50 S) Set Global Msg Scans : 50 │
│ D) Download a File : 50 S) Select Graphics Mode : 50 │
│ D) Open a Door : 50 T) Today's Callers : 255 │
│ F) File Transfer Area : 50 TP) Transfer Protocol : 50 │
│ H) View Help Files : 50 U) List System Users : 255 │
│ I) Write/Edit User Info : 110 U) Upload a File : 50 │
│ J) Join a Conference : 50 V) View Statistics : 50 │
│ K) Kill a Message : 255 V) View/Manip. Archive : 50 │
│ L) View Logged Directory: 50 W) View Welcome File : 50 │
│ N) New Files Search : 50 X) Toggle Expert Mode : 50 │
│ O) Page Sysop : 50 S/Z) Zippy DIR Search : 50 │
│ P) Page Length : 50 *) Global New Msg Read : 70 │
│ │
│ CALL - View Caller Log : 110 VER) Version of Software : 50 │
│ Enter '@' VAR's in Msgs : 110 Carbon Copy Messages : 100 │
│ Read ALL Mail/Comments : 255 K)ill any Message : 255 │
│ E) Edit Your Messages : 100 E)dit any Message : 255 │
│ Zero Time Each Logon : 110 Level Given New users : 50 │
╘═══ 14:22:40 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Security Level to Archive & Download Mail
-----------------------------------------
Enter the security level (0-255) required to archive and download
mail.
Security Level to List Bulletins
--------------------------------
Enter the security level (0-255) required to View bulletins.
Security Level to Leave a COMMENT
---------------------------------
Enter the security level (0-255) required to Leave a COMMENT to
the Sysop.
Download Security Level
-----------------------
Enter the security level required to use the 'D' command
from the file transfer area to 'DOWNLOAD' files from the BBS
to the user's system.
Note: MUST be 0-255
Security Level For the (D)oor Command
-------------------------------------
Enter the security level (0-255) required to use the "D" command
from the MAIN BBS prompt to OPEN a DOOR.
FeatherNet v4.00 - Page 33
Security Level For the (H) HELP Command
---------------------------------------
Enter the security level (0-255) required to use the "H" command
from the MAIN, CONFERENCE and FILE TRANSFER prompts to view the
system HELP files.
Security Level to EDIT User Information
---------------------------------------
Enter the security level (0-255) required to use the "I" command
from the MAIN BBS prompt to edit user information.
ANY user with at least this security level can edit the PASSWORD,
PHONE #'s and CITY/STATE fields of his/her user record. It is
recommended you allow ONLY mature users to use this command as it
permanently alters the above fields in the user's record in the
USERS file.
Security Level to (J) JOIN a Conference
---------------------------------------
Enter the security level (0-255) required to use the "J" command
to Join a Message Conference.
Security Level Required to Kill a Message
-----------------------------------------
Enter the security level (0-255) required to KILL a message
addressed TO or written BY a user.
Security Level to View Logged File Directory
--------------------------------------------
Enter the security level (0-255) required to use the "L" command
from the File Transfer prompt to view the currently LOGGED file
directory listing.
This is a slightly simpler method of listing a directory when it
is the last one you viewed.
Security Level to Search for New Files
--------------------------------------
Enter the security level (0-255) required to use the "N" command
from the File Transfer prompt to search for new files from a
specified (or given) date.
Security Level to use the (O) Operator Page Command
---------------------------------------------------
Enter the security level (0-255) required to use the "O" command
from the Main BBS prompt to Page the System Operator for a CHAT
Session.
Security Level to use the (P) Page Length Command
-------------------------------------------------
Enter the security level (0-255) required to use the "P" command
from the Main BBS prompt to adjust the default screen size.
FeatherNet v4.00 - Page 34
Security Level to use the (CALL) Command
----------------------------------------
Enter the security level (0-255) required to use the "CALL"
command from the Main BBS prompt to view the CALLER log file.
Discretion is recommended.
Security Level to use "@" Macros in Messages
--------------------------------------------
Enter the security level (0-255) required to use the "@"
variables in the message conferences.
Many ECHO MAIL networks do not allow the use of these so
discretion is strongly recommended.
Security Level to READ ALL Messages
-----------------------------------
Enter the security level (0-255) required to use read ALL
messages and COMMENTS. It is strongly recommended you reserve
this privilege for users you have unquestionable faith in such as
a Co-Sysop or business partner.
Security Level to EDIT Own Messages
-----------------------------------
Enter the security level (0-255) required for a user to EDIT
his/her OWN messages. This command can also be viewed as
allowing a user to KILL a message since the entire contents may
be discarded.
Discretion Recommended.
Security Level to Receive UNLIMITED Daily Time
----------------------------------------------
Enter the security level (0-255) required for a user to receive
unlimited daily time on the system. A user with this privilege
has his "time on today" counter automatically reset to ZERO (0)
each time he/she logs onto the system.
Discretion Warranted.
Security Level to use the (Q) Questionaire Command
--------------------------------------------------
Enter the security level (0-255) required to use the "Q" command
from the Main BBS prompt to answer the script questionaires.
Security Level to (Q/QQ) QuickScan Messages
-------------------------------------------
Enter the security level (0-255) required to use the "Q/QQ"
commands from the Conference prompt to perform the (Q) Quickscan
and (QQ) QuickerScan of messages.
FeatherNet v4.00 - Page 35
Security Level to (S) Set Conference Scans
------------------------------------------
Enter the security level (0-255) required to use the "S" command
from the Conference prompt to SET the Conferences to be scanned
when using the "*" Global New Mail Read Command.
Security Level to (S) Select Color Graphics
-------------------------------------------
Enter the security level (0-255) required to use the "S" command
from the Main BBS prompt to toggle the color graphics mode
(ASCII/ANSI).
Today's Callers Security Level
------------------------------
Enter the Security level required to utilize the command
(T)oday's callers from the main menu area (0-255).
Security Level to (TP) Change Transfer Protocol
-----------------------------------------------
Enter the security level (0-255) required to use the "TP" command
from the Main BBS and File Transfer prompts to change the default
file transfer protocol.
Security Level to List Users With (U) Command
---------------------------------------------
Enter the Security level required to list users with the (U)
Command from the Main Menu (0-255)
Upload Security Level
---------------------
Enter the security level required to use the 'U' command from the
file transfer area to 'UPLOAD' files to the BBS from the user's
system. Note: MUST be 0-255
Security Level to (V) View Selected Statistics
----------------------------------------------
Enter the security level (0-255) required to use the "V" command
from the Main BBS prompt to view selected personal statistical
information. The information displayed is in a file created by
the System Operator.
Security Level to (V) View Archives
-----------------------------------
Enter the security level (0-255) required to use the "V" command
from the File Transfer prompt to VIEW file archive contents and
perform manipulations (R)ead or (D)ownload thereon.
Security Level to View the Welcome FIle
---------------------------------------
Enter the security level (0-255) required to use the "W" command
from the Main BBS prompt to view the Welcome file.
FeatherNet v4.00 - Page 36
Security Level to use Toggle Expert Mode
----------------------------------------
Enter the security level (0-255) required to use the "X" command
to Toggle Expert mode ON/OFF.
Security Level for (S/Z) Zippy Directory Search
-----------------------------------------------
Enter the security level required to use the "S" or "Z" Zippy
File directory search to locate any text within the file
descriptions.
Security Level to use (*) Global New Message Read
-------------------------------------------------
Enter the security level (0-255) required to use the "*" command
from the Conference or Main BBS prompts to perform a GLOBAL new
message read scan.
Security Level to use (VER) BBS Version Command
-----------------------------------------------
Enter the security level (0-255) required to use the "VER"
command from the Main BBS prompt to list the BBS Version
information.
Security Level to Carbon Copy Messages
--------------------------------------
Enter the security level required for a user to send a "Carbon
Copy" of a message to another user (0-255). A user with
sufficient security level can send as many "cc" messages as he or
she wishes.
Security Level to KILL any Message
----------------------------------
Enter the security level (0-255) required to KILL any message in
any conference on the system. A user with this security level
may also:
o Edit his/her Security Level field by using the "I" command from
the Main BBS Prompt.
o Change the (S) Status of any message to/from PUBLIC and
RECEIVER ONLY.
Allow ONLY a Co-Sysop or VERY CLOSE Associate to use this
command.
Security Level to EDIT ANY Message
----------------------------------
Enter the security level (0-255) required to EDIT any message
he/she reads. This is another VERY Powerful command and much
discretion is warranted.
Allow ONLY a Co-Sysop or VERY Close Associate to use this
command.
FeatherNet v4.00 - Page 37
New User Security
-----------------
Enter the security level to be assigned new users (0-255)
This security level MUST also be included in the "PWRD" file.
╒════════════════════════════════════════════════════════════════════════════╕
│ Function Key Programming │
│ │
│ Function Key #1 : SYSOP^M │
│ │
│ Function Key #2 : PASSWORD^M │
│ │
│ Function Key #3 : │
│ │
│ Function Key #4 : │
│ │
│ Function Key #5 : │
│ │
│ Function Key #6 : │
│ │
│ Function Key #7 : │
│ │
│ Function Key #8 : │
│ │
│ Function Key #9 : │
│ │
│ Function Key #10 : │
│ │
╘═══ 14:22:46 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
------------------------
Function Key Assignments
------------------------
You may enter up to ten SHIFTED function key assignments.
These "strings" may be entered at the local keyboard instead
of having to type the text in each time.
For example, you could set the F1 key to send the string "F N
S A" when you are at the main menu to scan for new files in
all directories. You can program a key to your "signature"
and you will only have to press one key to sign a message.
Place "^M" in the definition to simulate pressing the ENTER
key.
The keys are assigned utilizing the FNCFG.EXE configuration
utility. Note that the SHIFT key and the desired Function key
must be pressed at the same time.
When running FNCFG.EXE the function key assignment is invoked
utilizing option "H" from the main menu.
FeatherNet v4.00 - Page 38
┌──────────────────────────────────┐
│ Saving Configuration Information │
└──────────────────────────────────┘
When ESC is pressed from the FNCFG main menu and you answer 'Y' to
the 'save configuration' question, the present configuration is then
saved and the file paths in the configuration will be verified.
o Any DOS Subdirectories not present will be created.
o All conference file paths and file names are also verified.
FeatherNet v4.00 - Page 39
┌────────────────────┐
│ RUNNING FEATHERNET │
└────────────────────┘
After running the configuration program (FNCFG.EXE), you are ready to run
FNET. There are several housekeeping details you must attend to first.
MODEM:
-----
Ensure that your modem is properly installed. If it is an external modem,
make certain that it is connected to the proper COMM PORT. If it is an
internal modem, make sure that you have the proper COMM PORT selected on
your modem or COMM PORT card as applicable.
BBS FILES:
---------
Ensure that FNET.EXE is in each NODE directory or somewhere in the DOS
PATH. Also, FNCFG.EXE, FNCHK.EXE, FNETSM.EXE, FNFILER.EXE and
FNZIPCMT.COM *MUST* be located in the DOS path.
You can now confidently run FeatherNet. Do this by invoking the SR.BAT
file. TYPE 'SR' and press <ENTER>. It is recommended that you place a
a command in your AUTOEXEC.BAT to automatically re-boot the BBS in case
of a power failure.
NOTE: Ensure the paths in SR.BAT are correct before running the bbs.
INSTALFN.EXE does modify SR.BAT with the proper paths but it
is advisable to view the file yourself.
FeatherNet v4.00 - Page 40
┌────────────────────────┐
│ WAIT For A CALL SCREEN │
└────────────────────────┘
The waiting for call screen will look something like this. Options are
selected with the Up/Dn/Left/Right arrows and executed by hitting ENTER.
┌────────────────────────────────────────────────────┐
10:44:45 │ The Programmer's Inn │ 03-17-93
└────────────────────┬─────────┬─────────────────────┘
│ Node 02 │
┌──────────────────────────────┴─────────┴─────────────────────────────────┐
│ │
│ Sysop Page - Yes DOS - Not Busy DOS - Busy │
│ │
│ Page Beep - Yes Local - Busy New Users: Yes │
│ │
│ FNETSM FNCFG FNFILER │
│ │
│ PRIVUTIL View Caller Log Sysop to Main │
│ │
│ Local Logon - the modem will be off-hook (Busy) │
├──┬────────────────────────────────────────────────────────────────────┬──┤
│ │ COM1: FeatherNet is Waiting for a call │ │
│ ├────────────────────────────────────────────────────────────────────┤ │
│ │ Calls: 81619 Free Ram: 342925 # Users: 861 │ │
│ │ │ │
│ │ Last Caller: RONNIE PIERCE (BUTTE, MT (09:27) │ │
│ │ │ │
│ └────────────────────────────────────────────────────────────────────┘ │
│ FeatherNet BBS Version 4.00 (C) Copyright 1988, 1993 FeatherNet Software │
└──────────────────────────────────────────────────────────────────────────┘
LOGGING ON
----------
To logon locally, use the arrow keys to highlite 'Local - Busy' and
press (Enter).
NOTE: A script questionnaire can be enabled to enhance the logon
process. Refer to the section on script questionnaires later in
this manual.
FeatherNet v4.00 - Page 41
┌─────────────────────────────────────────────────────────────────┐
│LOCAL SYSOP Function Key and Special Key Combination Assignments │
└─────────────────────────────────────────────────────────────────┘
During BBS Operation and while waiting for a call, the function keys
are scanned for a keypress. Here are the functions of each function key.
F1 : Toggles Sysop Chat Availability (Disabled at WFC)
F2 : Toggles Page Bell (Beep) Status (Disabled at WFC)
F3 : Sysop Breaks into chat mode to chat with the caller
F4 : Quickly LOGOFF the caller. Recycle the modem if no-one is on-line
F5 : Raise/Lower the Caller's security level. This is a permanent
change and will be saved when user exits to DOS or logs off
F6 : Access the Sysop Maintenance Utility or upgrade the caller online.
F7 : Adds 1 minute to user's allowed time (Current Day Only)
F8 : Subtracts 1 minute from user's allowed time (Current Day Only)
F9 : Local Drop to DOS. Type 'EXIT' to return to FeatherNet.
F10: Displays a 'Help' screen for the sysop.
ALT-C : This key combination which will capture the current screen into
a file named 'FNET.IMG'. The file is maintained in each node
directory and is written to by any node. It is an appended
ascii file and is 'added to' with each capture.
ALT-N : This key combination toggles whether FNET is being operated as
an 'OPEN' or a 'CLOSED' system. If FNET is operating as a
'CLOSED' system new callers are not allowed access but may
answer a script questionaire (if the sysop makes one available).
ESC : Respond to a "chat" request and begin chat. Also, exit's chat.
FeatherNet v4.00 - Page 42
┌──────────────────────────────────────┐
│ FeatherNet Menu Commands/Functions │
└──────────────────────────────────────┘
Below is a sample MAIN BBS Menu. A user is always placed at the
MAIN BBS command prompt immediately following the logon sequence (which may
include reading private mail). The commands shown are NOT all the commands
available at the MAIN BBS prompt. These will also be discussed.
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ The Programmer's Inn Main Menu █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒ Sub-Menu's ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒ General ▒▒
▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒ Utilities ▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒
▒█[B] Bulletin Menu █░▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒█[H] Help File █░▒
▒█[D] Door Menu █░▒█[S] Screen Color On\Off█░▒█[N] Node Chat Status█░▒
▒█[J] Conference Menu █░▒█[X] Expert Mode On\Off █░▒█[T] Today's Callers █░▒
▒█[Q] Questionaire Menu █░▒█[P] Set Page Length █░▒█[U] User Listing █░▒
▒█[F] File Transfer Menu█░▒█[I] Edit/View Userinfo █░▒█[W] Welcome File █░▒
▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒█[V] Your Statistics █░▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒
▒▒▒░░░░░░░░░░░░░░░░░░░░░░░▒█[*] Global Msg Read █░▒▒▒░░░░░░░░░░░░░░░░░░░░░▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█[TODAY] Today'n History█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒ Sysop ▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒ Call Again! ▒▒
▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒
▒█[O] Page Sysop █░▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒█[G] Goodby\Logoff█░▒
▒█[C] Comment to SYSOP█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒
▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
The commands available at the main menu are in [] brackets. Note
that most of these commands can be restricted by security levels
covered earlier in this manual.
The 'B' command allows reading of bulletins. At the bulletin menu a
user has several choices and sees this prompt:
(A)ll, (D)ownload, (N)ew, (T)ext Search, or #?
o Entering "A" allows the user to view all bulletins.
o Entering "D" allows a user to download 1 or more bulletins.
o Entering "N" will cause ONLY new bulletins (since last call) to be
displayed.
o Entering "T" allows a user to perform a TEXT search of all bulletins.
If the text is located in a bulletin that entire bulletin will be
displayed to the user with the search TEXT highlighted if the caller
has ANSI capability.
o The user may enter the number of a bulletin or bulletins to be
displayed. If more than one is to be read the numbers should be
separated by a SPACE.
The 'D' command allows external "DOOR" programs to be run. Door
operation is covered elsewhere in this manual.
The 'J' command allows you to (J)oin a Message Conference.
The 'Q' command allows you to view (and answer) the available script
questionaires.
FeatherNet v4.00 - Page 43
The 'F' command allows you to perform File Transfers functions at the
File Transfer Command Prompt.
The 'O' command allows you to page the SYSOP for a chat.
The 'C' command allows you to Leave the Sysop a (C)omment.
The 'S' command toggles Color Graphics ON or OFF
The 'X' command toggles Expert (menus off) or Novice prompts (menus on).
The 'P' command allows users to Set the Length of their Terminal Screen.
The 'I' command allows users to view or change certain information:
o Security Password
o City/State
o Default File Transfer Protocol
o Telephone Number
Allows Sysop's to edit more user information, delete/undelete users, set
conference flags, Co-Sysop Flag and Person Private File transfer Flag.
The 'V' command displays selected user Information and statictics
contained in the file "USERSTAT" (a FeatherNet SYSTEM file).
The '*' command performs a "global" scan for new messages (public and
private) a user is allowed to read. All conferences a user has
"flagged" for reading will be scanned for new mail. The user may abort
at anytime by pressing the SPACEBAR.
The 'TODAY' command allows users to view the contents of the ascii or
ansi files produced by a "TODAY" program (configured elsewhere in
FNCFG).
The 'H' command displays a "help" file for the main menu commands. This
file can be edited by the sysop.
If the SYSOP desires, additional HELP files may be available for a
number of reasons. Users can view these by entering "H Filename" where
"FILENAME" is the actual DOS name of the help file to be viewed. Any
files to be used as additional HELP files must be located in the "HELP"
subdirectory.
The 'N' command will list 'node' status. Who is online on each node.
The 'T' command will display a listing of today's callers.
The 'U' command will display a list of active users.
The 'W' command will display the welcome file.
The 'G' command will log a user off the BBS.
The 'X' command allows users to toggle expert mode - menus on or off.
The 'VER' command will show users the current version of the FeatherNet
software being used.
A command ONLY persons with SYSOP security level may utilize is 'CALL'.
This displayes the caller log file in reverse chronological order.
FeatherNet v4.00 - Page 44
Below is a sample Conference Area Menu. A user must "J"oin a
conference from the Main BBS Prompt or from the File Transfer Prompt to be
at the Conference Area Menu.
From the selections available here, users can capture messages for
downloading, read mail, scan messages, enter messages to other users,
search messages for specific text, flag conferences to be scanned and
adjust high message read pointers.
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ The Programmer's Inn Message Menu █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒ Menu's ▒▒▒▒▒▒▒▒▒ Utilities\Search ▒▒
▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒
▒▒▒█ [F] File Transfers Menu █░▒▒▒▒▒▒▒▒█ [A] Archive New Messages █░▒
▒▒▒█ [J] Conference Menu █░▒▒▒▒▒▒▒▒█ [H] Help File █░▒
▒▒▒█ [M] Return to Main Menu █░▒▒▒▒▒▒▒▒█ [L] Reset High Message Pointers █░▒
▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒█ [QQ] QuickerScan █░▒
▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒█ [Q] QuickScan █░▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ [S] Set Global Message Scan Flags█░▒
▒▒▒ Mail ▒▒▒▒▒▒▒▒▒▒▒█ [T] Search Messages █░▒
▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒
▒▒▒█ [E] Send a Message █░▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒
▒▒▒█ [N] New Mail (If Any) █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒ Call Again! ▒▒▒▒▒▒
▒▒▒█ [R] Read Mail █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒▒▒
▒▒▒█ [*] Read All NEW Mail █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ [G] Goodbye\Logoff █░▒▒▒▒▒
▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒
▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
The 'F' command allows a user to perform File Transfers functions at the
File Transfer Command Prompt.
The 'J' command allows users to (J)oin another Message Conference.
The 'M' command returns users to the Main BBS Prompt.
The 'E' command allows users to ENTER a message to another user.
The 'N' command allows users to read any NEW mail. This NEW mail
is any message numbers higher than the user's current high message read
pointer. Of course a user MUST have a sufficient security level to read
a given message.
The 'R' command allows users to read any messages the have a sufficient
security level for.
The '*' command performs a "global" scan for new messages (public and
private) a user is allowed to read. All conferences a user has
"flagged" for reading will be scanned for new mail. The user may abort
at anytime by pressing the SPACEBAR.
The 'A' command allows users to archive mail for downloading. The user
can either archive only the currently joined conference or select all
conferences he has flagged for scanning. The mail will be archived
using either the ZIP, ARC, ARJ or LHA archive methods.
FeatherNet v4.00 - Page 45
The 'H' command displays a "help" file for the Conference Area.
The 'L' command allows users to reset the high message read pointer for
either the currently joined conference or ALL conferences. The
currently joined conference pointer can be set to ANY valid number while
ALL conferences may be set to either the low or high message number.
The 'QQ' command performs a brief message header scan of the currently
joined conference. Information displayed is FROM, TO, SUBJECT, DATE &
TIME of Message and MESSAGE STATUS.
The 'Q' command performs a message header scan of the currently joined
conference and also adds to the above information by including the first
line of the message text.
The 'S' command allows users to flag conference to be used in global
message scans. Conferences flagged are included when a "*" global new
message read is performed and may be used when archiving mail if the
user so desires.
The 'T' command allows users to perform a TEXT search in messages. The
currently joined conference or all flagged conferences may be included
in this search. If a user has ANSI capability FeatherNet will HIGHLIGHT
the "found" text.
The 'G' command will log a user off the BBS.
The 'X' command allows users to toggle expert mode - menus on or off.
FeatherNet v4.00 - Page 46
Below is a sample File Transfer Area Menu. From the selections
available here, users can list/search files and descriptions, view archives
and perform manipulations such as reading files with an archive and
downloading specific files from the archive, test archives for integrity
and having them scanned for virii, download/upload files, perform personal
private file transfer functions if authorized by the sysop and change
default transfer protocol.
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ The Programmer's Inn Files Menu █░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒ Directory Menu ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒▒▒▒▒▒ Search\View\Test ▒▒▒
▒█ [F] Directory List █░▒▒▒▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒
▒█ [L] List current Directory █░▒▒▒▒▒▒▒▒█ [S] Search Filename\Description █░▒▒
▒█ [Q] Main Menu █░▒▒▒▒▒▒▒▒█ [N] New Files Search █░▒▒
▒█ [J] Conference Menu █░▒▒▒▒▒▒▒▒█ [V] View or D\L from archive █░▒▒
▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒▒▒▒▒█ [TEST] Test Archive Integrity █░▒▒
▒▒▒░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
▒▒▒▒ Utilities ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒ File Transfer's ▒▒▒▒
▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒ Call Again! ▒▒▒▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒
▒▒▒▒█ [H] Help File █░▒▒█▀▀▀▀▀▀▀▀▀▀▀▀▀█░▒▒▒▒█ [D] Download a File █░▒▒▒
▒▒▒▒█ [X] Expert Toggle █░▒▒█ [G] Goodbye █░▒▒▒▒█ [U] Upload a File █░▒▒▒
▒▒▒▒█ [TP] Change Protocol █░▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒█ [P] Private File's █░▒▒▒
▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒▒░░░░░░░░░░░░░░▒▒▒▒█▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄█░▒▒▒
▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░░░░░░░░░░▒▒▒
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
The 'F' command allows users to select a single directory, several
directories or a range of directories to list.
The 'L" command provides a means of listing the currently logged (or
last directory listed) file directory.
The 'Q' command sends users back to the Main BBS Prompt.
The 'J' command allows you to (J)oin a Message Conference.
The 'H' command displays a "help" file for the File Transfer Area.
The 'X' command allows users to toggle expert mode - menus on or off.
The 'TP' command allows users to change the default file transfer
protocol.
The 'S' or 'Z' command allows users to perform a text search of the
file descriptions. This will locate filenames or text in the
descriptions and no wildcards (*.*, ?.?) or allowed nor are they
necessary.
Searches may be done using OR (|) or AND (&) operators as well as a
single text string search.
The below examples are all assuming you are already at the file
transfer area.
FeatherNet v4.00 - Page 47
OR Search
---------
Enter text to search using the "|" operator between the text strings.
Example: S RON | FEATHER A
Result: Displays all file descriptions containing the text "RON" or
the text "FEATHER". All directories were searched.
AND Search
----------
Enter text to search using the "&" operator between the text strings.
Example: S RON & FEATHER A
Result: Displays all file descriptions containing the text "RON" and
the text "FEATHER". All directories were searched.
The only thing changed is the search operators. Directory numbers may
be entered on the command line as always.
The 'N' command allows users to search for new files by date range. The
last search date is maintained in the users file.
The 'V' command allows users to view the contents of archives.
Additionally users may read text files within an archive and download
specific files from an archive. The user's file ratio is maintained
when downloading files from within an archive and the Sysop controls
the number of lines a user may read from a text file.
The 'TEST' command allows users to TEST an archive for Integrity to
determine if the archived file is intact and capable of being
de-archived to disk. ULTESTER (used during this test) also uses the
Sysop's selected virus scan program to check all files in the archive
for known virii.
The 'D' command allows users to download a file from the bbs. Download
means to receive a file from a remote system (BBS).
The 'U' command allows users to upload a file to the bbs. Upload
means to send a file to a remote system (BBS).
The 'P' command allows users (the sysop has granted authorization to)
to perform personal PRIVATE file transfers. A user can send a private
file to another AUTHORIZED user and only that user may see the name of
the file and its one line description. ONLY that user may download a
personal PRIVATE file. Of course the SYSOP has complete control of the
bbs files when he is at the computer the bbs is run on.
FeatherNet v4.00 - Page 48
┌──────────────────────────────────────┐
│ FIle Transfer System Control Files │
└──────────────────────────────────────┘
DIR.LST ('type' file - does NOT need to be named "DIR.LST")
-------
Several files help the SYSOP control the file transfers. The
DIR.LST file is configured in the conference configuration screen
in FNCFG. Each file directory entry has a security level assigned
to it. FeatherNet requires a user to have sufficient security
level to even list the files in a given directory. This is
good for the sysop and user. A user can't see the names and
descriptions of files he isn't allows to download or perform a
(V)iew upon.
Conferences can share the same DIR.LST file, use a unique DIR.LST
file or have no DIR.LST file at all. A conference having no
DIR.LST type file defined has no file transfer functions available
when a user (J)oins it. A sysop can have a simple configuration
sharing one DIR.LST type file or could opt for a more complex
configuration where several conferences would have unique DIR.LST
type files defining the file directories and download paths
available for the conference. With the latter, a user must pass
through several security features to be able to list and download
files in a conference:
(1) Security level to join the conference if it is PUBLIC.
(2) Must be given special access to the conference by the Sysop if
the conference is PRIVATE.
(3) Must have a sufficient security level to download files in a
given directory once he has joined the conference.
RATIO
-----
File transfer ratios are controlled by a file named RATIO and can be keyed
to security level. RATIO is an ascii text file with 4 fields delimited by
commas as follows.
field1, field2, filed3, filed4
There are four modes available to the sysop to selectively control the file
transfer download/upload ratios of all users. If desired, a security level
can be exempt from ratio control altogether. FNET maintains the number of
files and bytes uploaded and downloaded and will refer to this file before
every transfer. There MUST be an entry for EACH SECURITY LEVEL you assign.
***** RATIO MUST reside in the main BBS directory *****
field1 - security level the entry applies to
field2 - '1' if ratios are enforced for this security level, '0' if not
field3 - Ratio 'method' to use (0, 1, 2, or 3)
method0 - Ratios determined using files uploaded to files downloaded
method1 - Ratios determined using bytes uploaded to bytes downloaded
method2 - Downloads limited to a specified number of files per day
method3 - Downloads limited to a specified number of bytes per day
FeatherNet v4.00 - Page 49
field4 - Ratio to use. This is an integer (or long integer) which sets the
ratio of files or bytes which can be downloaded per uploaded file
or byte.
Sample 'RATIO' file entries are:
30,1,0,4
Security level '30' has ratios enforced (1) by the files downloaded/uploaded
method (0). The user must maintain a ratio of one file uploaded to each
four files downloaded (4).
40,1,1,5
Security level '40' has ratios enforced (1) by the bytes downloaded/uploaded
method (1). The user must maintain a ratio of one byte uploaded to each
five bytes downloaded (5).
50,1,2,10
Security level '50' has ratios enforced (1) by the files downloaded per day
method (2). The user can download ten files per day.
60,1,3,750000
Security level '60' has ratios enforced (1) by the bytes downloaded per day
method (3). The user can download (750,000) bytes per day.
70,0,0,0
Security level '70' is exempt from ratios (0). FNET ignores the remainder
of the entries when ratios are not enforced. Uploads and downloads are
still recorded (number of files and bytes).
PWRD
----
This file MUST be formatted as follows. Note that each access level
assigned to BBS users MUST be supported in the PWRD file or the user
will be given a default on-line time of 20 minutes regardless of his
access level.
,1,5,0 ;Access level of 1 gets 5 minutes on-line and d/l 0K bytes
,10,10,50 ;Access level of 10 gets 10 minutes on-line and d/l 50K bytes
NOTE: Beginning with version 3.12, FeatherNet uses a RATIO file for file
download control and not the PWRD file. The PWRD file is still useed by
FeatherNet for determining a user's time allowed per day.
FSEC
----
This file is not required by FeatherNet but is described for those who will
run ProDoor
H:\UPLOADS\,*.*,10, ;Download Path, any file, access level 10 required
G:\PRIV\,*.*,115, ;Download Path, any file, access level 115 required
G:\IBMUTILS\,*.*,20, ;Download Path, any file, access level 20 required
FeatherNet v4.00 - Page 50
UPSEC
-----
This file is not required by FeatherNet but is described for those who will
run ProDoor
C:\UPLOADS\,*.EXE,100, ;Path, file name info, access required to U/L
C:\UPLOADS\,*.TXT,100, ;Path, file name info, access required to U/L
C:\UPLOADS\,*.ZOO,100, ;Path, file name info, access required to U/L
FeatherNet v4.00 - Page 51
┌─────────────────────────────────────┐
│ File List Directory Files (DIRxx) │
└─────────────────────────────────────┘
If you are starting from scratch, use a text editor to edit the various file
list directories files. The file directories are named 'DIRxx' (where xx is
a number from 1-200).
This is the format and a sample FeatherNet File Listing Directory file.
There MUST be at least one non-description line in the file before the
actual file directory information begins in order for the search to
properly work.
The format for the directory listing is:
----------------------------------------------------------------------------
0 1 1 2 2 3 3 7
1----------2--5-----1--4------1--4-----------------------------------------9
Name Size Date Description
----------------------------------------------------------------------------
File Name is positions 1-12.
Size is positions 15-21 right justified.
Date is positions 24-31.
Description text is positions 34-79.
A "|" character is at posaition 32 for each multiple description line.
A sample entry for a DIRxx file is:
MC-VISA.ZIP 1202640 10-28-90 Master-Card Visa Sysops, use Credit Cards
| on your BBS.
| Uploaded by: RON PIERCE
The format is provided as a guide to properly format the directory entries.
ALL fields MUST begin at the start positions indicated in the sample except
for the SIZE field. It should END at position 21 and begin at position 15
or higher.
IMPORTANT
---------
The DIRxx files MUST have a minimum of 2 lines in the header for proper
operation and to prevent possible lockups due to the nature of the speedy
search routine used for text or date searches.
NOTE: There are a number of utilities that make short work of DIRxx list
maintenance. Among them are DFMS, RWDIR and WGM-DMS. They can be
found (along with a ton other DIR utilities) on most BBSes.
The directory listing files are configured in the conference
configuration in FNCFG. The names of the lising files are
contained in the DIR.LST type file along with the category or name
of the directory listing, security level and a DOS path where
FeatherNet should look for the actual files.
FeatherNet v4.00 - Page 52
┌─────────────────────────────────┐
│ Other FeatherNet Control Files │
└─────────────────────────────────┘
FNETPROT.DAT
------------
This is an ascii text file that must be EDITED BY THE SYSOP which contains
external protocol information that FeatherNet uses to display the available
file transfer protocols and to create the batch files for transfers.
* There MUST be a separate fnetprot.dat file for each node on your system *
A sample fnetprot.dat file and its format description is given below.
----------------------------------------------------------------------------
1
Z110Zmodem with Resume Capability - (Still the best!)
DSZ handshake slow port %1 pB4096 sz -s -m
DSZ handshake slow port %1 pB4096 rz -m -r
Breakdown of the entry
----------------------
1 - Number of external protocols available
Z - Letter (HOTKEY) to select this protocol
1 - Use a 1 if the protocol can resume an aborted upload as Zmodem can.
1 - Enter a 1 if the protocol supports batch transfers
1 - Enter a 1 if the protocol supports Bi-Directional transfers
Zmodem with Resume Capability -> Protocol description - 40 Character Limit
DSZ ha sl port 2 pB4096 sz -s -m ;This is the send command line
DSZ ha sl port 2 pB4096 rz -m -r ;This is the receive command line
The above is a DSZ (Zmodem) command line. For further information,
refer to the docmentation for the external protocol you are configuring.
----------------------------------------------------------------------------
Below is an actual FNETPROT.DAT file configured for serial port #1.
6
Z110Zmodem with Resume Capability - (Still the Best!)
DSZ handshake both port %1 pB4096 sz -s -m
DSZ handshake both port %1 pB4096 rz -m -r
P110Puma Protocol with Resume Capability
Puma LC:\FNET\DSZLOG p%1 x+ s
Puma LC:\FNET\DSZLOG p%1 x+ r+ r
G010Ymodem-G Batch (Error Correcting Modems ONLY!!)
DSZ handshake both port %1 sb -k -g -s
DSZ handshake both port %1 rb -g -p
O000Xmodem-1k
DSZ handshake both port %1 sx -ks
DSZ handshake both port %1 rx -c -k -y
C000Xmodem CRC and Checksum
DSZ handshake both port %1 sx
DSZ handshake both port %1 rx -c
H111HS/Link (Bi-Directional / Start 2-Way Transfers as D/L!)
C:\HSLK\HSLINK -P%1 @C:\FNET\NODE1.CFG
C:\HSLK\HSLINK -P%1 @C:\FNET\NODE1.CFG
You would normmaly maintain an FNETPROT.DAT file for each node of your
system unless nodes on a network use the same serial port number.
FeatherNet v4.00 - Page 53
┌───────────────────────────┐
│FEATHERNET BBS FILE FORMATS│
SRCONFIG └───────────────────────────┘
--------
This is the main BBS configuration file. It is straight ASCII and it is
created by FNCFG in each NODE directory. A sample SRCONFIG file with a
short description of the contents follows:
MARTIN NITRAM Sysop's name
C:\FNET BBS Program Main Directory
1 Number of this Node
C:\FNET This Node Home Directory
140 Max messages per archive run
115 Userfile edit access (remote sysop access)
1 Lock Comm Port at opening baud rate (1=Y, 0=N)
COM1 ComPort for this node (COM1, COM2, COM3, COM4)
ATZ Modem reset string
38400 Baud Rate at which to Open the Serial Port
30 New User's access level
1 A '1' if questionnaires used or a '0' if Not
25 How long for modem to wait for a connection
C:\FNET\WORK\ Node work dir ( ALL Files get deleted here)
3 Number of questionnaires available
1200 Lowest baud rate to allow onto BBS
1 Use the TODAY function. (1=Y, 0=N)
000000.00 FeatherNet Bulletin Board System Registration #
1 '1' if Zip Comments will be added to u/l's (or '0')
1000 Minimum Kbytes on upload drive to accept u/l's
8 Number of Bulletins available
NETEXP Name of EVENT batch file (NO '.BAT')
23:30 Time to run EVENT if EVENT active. Or ' '
30 Days before subscription expired warning
1 Expired security level (when subsc. expires)
1 '1' if subscription mode desired (or a '0')
0 '1' if RingBack option desired (or '0')
45 Seconds to wait for ringback
0 1 if a FrontDoor program is used or 0 if not
0 0 if not running under DESQview or 1 if yes.
1 1 if you want 'uploaded by' in file desc or 0
0 0 if you don't want high ascii filter or 1
C:\FNET\SECMSG\ Directory security level files are located in
0 Minutes before modem is reinitialized
H:\UPLOADS\DUPES\ Path to the duplicate u/l hold directory
30 Security level required to download files
30 Security level required to upload files
30 Security level to enter file transfer area
1 Graphics in local logon? 1=Yes 0=No
0 Force Users into door at logon? 1=Yes 0=No
.5 Upload time credit factor
10 Unused
1 Warn if files flagged at logoff? 1=Yes 0=No
1 Ask to set msg pointers at logoff? 1=Yes 0=No
0 Unused
Unused
1 Unused
Unused
FeatherNet v4.00 - Page 54
SRCONFIG continued...
--------
Y 'Y' permits SWAPPING to EMS/XMS/Disk
50 Security level to list users
Unused
1 Allow Private Personal Transfers: 1=Yes 0=No
C:\PRIV\ Private Personal File Transfer file directory
0 3 Second pause after CONNECT =< 2400 baud. 0=Yes
50 Security level to Archive and D/L Messages
1 '1' enables the split screen chat. '0' disables
1 '1' to always ask users to select transfer protocol
2 The number of Nodes configured on your system
1 '1' enables auto-ansi detect at logon. '0' disables
0 Default subscription in days (0-999) for new users
00:00 Sysop Available Start Time
23:59 Sysop Available Stop Time
0 '1' allows one name users (handles), '0' disallows.
0 '1' allows a login as SYSOP from remote.
F F 1^m 1st of 10 Shifted F-Keys which may be defined.
2nd Key
3rd Key
4th Key
5th Key
6th Key
7th Key
8th Key
9th Key
J 0 R-^M 10th (Last) Shifted F-Keys which may be defined.
1 '1' enforces the above Sysop availability for chat
Path/name of program to run before & after transfers.
&H3F8 Serial Port Base Address
&H4 IRQ number to use
I:\FNETTEXT Path/Name of the "FNETTEXT" file
0 Unused
1010 Number of lines users allowed to read from archive
255 Security Level req'd to Kill own Message
255 Security Level rq'd to list (T)oday's callers
100 Security Level req'd to Carbon Copy messages
C:\FNET\MAINMEN Main BBS Command Menu file
C:\FNET\CONFMEN Conference Command menu
C:\FNET\XFERMEN File Transfer Menu
C:\FNET\SCRIPT Script Questionaire Menu
C:\FNET\LOGON Initial welcome file name
C:\FNET\SRWELC1 NEWS file name
C:\FNET\SRWELC After login welcome file
C:\FNET\NEWUSER New User welcome file
C:\FNET\CLOSED Text file shown new users if system is private
C:\FNET\CALLER1 Caller Log file
C:\FNET\EXPWARN Expired Subscription Warning File
C:\FNET\EXPIRED File displayed when subscription has lapsed
C:\FNET\SCRIPT.0 New User script Questionaire
C:\FNET\BYE Logoff File - shown after the (G)oodbye Command
I:\TODAY\TODAY "TODAY" text file - if a TODAY program used.
C:\FNET\DLWARN Download warning file
C:\FNET\ULWARN Upload warning File
C:\FNET\USRSTAT User statistical information file
FeatherNet v4.00 - Page 55
255 Security Level req'd to Kill ANY Message
255 Security Level req'd to Edit ANY Message
110 Security Level req'd to Enter @ macros in messages.
255 Security Level req'd to Read ANY Message
110 Security Level req'd to View CALLERS Log
50 Security Level req'd to user VER command
100 Security Level req'd to Edit own Messages
110 Security Level req'd to Edit User Information
50 Security Level req'd to View Bulletins
50 Security Level req'd to Leave a (C)omment to Sysop
50 Security Level req'd to Use (D)oor Command
50 Security Level req'd to view (H)elp Files
50 Security Level req'd to (J)oin a Conference
50 Security Level req'd to (L)ist Logged File DIR
50 Security Level req'd to perform (N)ew Files Scan
50 Security Level req'd to Page System (O)perator
50 Security Level req'd to change screen (P)age Length
110 Security Level req'd to have unlimited time per day.
50 Security Level req'd to answer script (Q)uestions
50 Security Level req'd to perform (QQ/Q) Msg Scans
50 Security Level req'd to (S)elect Message Scans
50 Security Level req'd to toggle (S)creen Color Mode
50 Security Level req'd to (TP) change transfer protocol
50 Security Level req'd to (V)iew user's Statistics
50 Security Level req'd to (V)iew/Manipulate archive
50 Security Level req'd to read the (W)elcome file again
50 Security Level req'd to toggle expert mode (X)
50 Security Level req'd to use (S/Z) zippy file search
70 Security Level req'd to use (*) Global New Msg Read
1 Show bulletin menu if new bltns? 1=yes; 0=No
10 Suspend callers how many mins before event
C:\FNET\USRNDX\ Path to the PCBNDX.x user index files
C:\FNET\UPLOD\CONFX Path/Name of the conference listing file
C:\FNET\HELP\ Path to "custom" help files
C:\FNET\COSYSOP.BIT Path/Name of the CoSysop Bitmap File
1 Ask "if you want color at logon" - 1=Yes; 0=No
1 Number of "rings" before sending modem answer command
C:\FNET\PWRD Path/Name of the "PWRD" file
C:\FNET\RATIO Path/Name of the "RATIO" file
FeatherNet v4.00 - Page 56
USERS File
----------
The 26 USERS file 'quick' index files are automatically generated by the
BBS when the file is packed in the filename format of pcbndx.x - where 'x'
is a letter from A-Z. These index files contain the names of all registered
system callers, sorted alphabetically by last name. Each file contains a
caller's record number and their complete username. Each record in the file
is 27 bytes long. The first two bytes as the caller's record number in the
main USERS file, and the last 25 bytes contain the caller's first and last
names.
1,25 Ascii First & Last Name
26,24 Ascii City & State
50,12 Ascii Password
62,13 Ascii Business/Data Phone Number
75,13 Ascii Voice/Home Phone Number
88,6 Ascii Last Date on in (yymmdd) format
94,5 Ascii Last Logon Time in (hh:mm) format
99,1 Ascii Expert Mode (Y or N)
100,1 Ascii Protocol Type
101,1 Space (Reserved for future use)
102,6 Ascii Last DIR look date (yymmdd) format
108,1 chr$ Security Level
109,2 MKI$ Number of times on System
111,1 chr$ Page Length
112,2 MKI$ Number of Uploads
114,2 MKI$ Number of Downloads
116,8 MKD$ Daily Download Bytes so Far
124,30 Ascii User Maintained Comment
154,29 Ascii Sysop Maintained Comment
183,1 BITMAP Bit 0 is Private File Transfers allowed
Bit 1 is Private File(s) waiting to be D/L
{ 0 = No Access / No Files Waiting }
184,2 MKI$ Elapsed Time on System for that Day
186,6 Ascii Subscription Registration Date (yymmdd)
192,1 chr$ Subscription Expired Security Level
193,1 chr$ Conference the user last joined
194,5 BitMap Area Registration Information (1-39)
199,5 BitMap Used to indicate conferences with personal mail
204,5 BitMap User Message Areas 'I want to scan'
209,8 MKD$ Total Bytes Downloaded - all calls
217,8 MKD$ Total Bytes Uploaded - all calls
225,1 Ascii Delete Flag (Y or N)
226,4 MKS$ Last Read Message Area 0 (Main)
230,156 MKS$ This range of bytes contain the last message
read pointers for all the conference message
bases (1-39). Each message base pointer uses
4 bytes to store its number. In other words,
the last read pointer for message base 1 is
located at position 230 for 4 bytes. For
message base 16, the information would be
located at position 290 for 4 bytes, etc.
386,15 ProDoor Presently this area is used by ProDoor as well
Net-Mail some Netmail programs. FeatherNet will not use
this area to avoid conflict.
FeatherNet v4.00 - Page 57
USERNET.DAT
-----------
A random access file located in the FNET main directory. Used internally
to maintain node chat status. The file is composed of one 53 byte 'record'
for each node the sysop has defined.
Start Pos/Len Description
----------------------------
1,2 # of the opposite Node CHAT (if one-on-one chat), or:
'A ' Available for chat
'U ' Node is Unavailable (Down for Maintenance)
'D ' Opened a Door
'E ' Entering a message
'T ' File Transfer
'G ' In Group CHAT
' ' (2 spaces) if no caller is on-line for a node
3,2 # of the Node requesting the CHAT, or 'R ' chat request sent
5,25 Name of User in the node
30,24 City and State the user is from
Message Base File Formats (128 bytes per block)
-----------------------------------------------
Header Block of Message Base for each Area
1,4 MKS$ High Message Number (0 to 9,999,999)
5,4 MKS$ Low Message Number (0 to 9,999,999)
9,4 MKS$ Number of Active Messages (0 to 32767)
13,4 MKS$ Number of System Callers (0 to 9,999,999)
17,6 Ascii 'LOCKED' when message is being written to disk
23,105 Space (Reserved for future use)
First Block of Each Actual Message
1,1 Ascii Status Flag
2,4 MKS$ Message Number (1 to 9,999,999)
6,4 MKS$ Reference Message Number (1 to 9,999,999)
10,1 chr$ Number of 128 byte blocks in the message
11,8 Ascii Date of message as (mm-dd-yy)
19,5 Ascii Time of Message as (hh:mm)
24,25 Ascii Who the Message is For
49,4 MKS$ Date of reply message as (yymmdd)
53,5 Ascii Time of last reply message
58,1 Ascii The letter 'R' if an 'ALL' msg. has reply(s)
59,25 Ascii Who the Message is From
84,25 Ascii The Subject of the Message
109,12 Ascii Password of the Message (Not Used)
121,1 Ascii chr$(225) for active or chr$(226) for
inactive
122,1 Ascii The letter 'E' if message is to be echoed
123,6 Space (Reserved for future use)
The message base index files for each message base in use are created in
the format <message base filename>+'.NDX'. This file is pre-formatted to
a size of 4096 bytes times the number of message base blocks defined per
section of the board (1 block = 1024 messages). Each 4 byte record is the
'address' of the respective message number starting block location in the
FeatherNet v4.00 - Page 58
message base (a 'single precision' number in MKS$ format). Since the index
file must be able to access a very large message base (in excess of 3 meg is
possible), addresses are stored as single precision numbers. If there is no
message, a '0' is written to the file. If the message has been killed, the
address is a negative number. Under this format, the index automatically
'floats' - based on the low message number and the number of defined
blocks.
PCBOARD.SYS
-----------
This is the exit to DOS information FNET uses to maintain a caller's stats
and the system's configuration upon exit to DOS when running a DOOR, during
file transfers, or viewing some archives
Start Pos, Saved As Description of Data
Length
1, 2 Ascii '-1' always used by FNET
3, 2 Ascii ' 0' always used By FNET
5, 2 Ascii '-1' if page allowed or 0 if not.
7, 2 Ascii User Number in Users file
9, 1 Ascii 'Y' if Expert or 'N' if Not
10, 2 Ascii '-1' if Error Correcting modem or ' 0' if not
12, 1 Ascii 'Y' if Graphics Mode or 'N' if Not
13, 1 Ascii 'A' is always placed here by FNET
14, 5 Ascii The DTE speed or PC to Modem baud rate
19, 5 Ascii The connect baud rate: '300 ' - '38400' or 'Local'
24, 2 MKI$ User's Record # in 'USERS' file
26, 15 Ascii User's FIRST Name padded with spaces
41, 12 Ascii User's Password
53, 2 MKI$ Time user logged on in Minutes: (60 * Hr) + Minutes
55, 2 MKI$ User's Time on today in minutes
57, 5 Ascii Time user logged on in HH:MM format. Ex: '12:30'
62, 2 MKI$ Time user allowed today in minutes
64, 2 Ascii Daily D/L Limit from pwrd file
66, 1 Chr$ Conference the user has last joined
67, 5 Bitmap Areas user has been in
72, 5 Bitmap Areas user has scanned
77, 2 MKI$i An mki$(0) used by FNET
79, 2 MKI$ Currently a value of 0 is placed here (MKI$(0))
81, 4 Ascii 4 Spaces are placed here
85, 25 Ascii User's Full name placed here.
110, 2 MKI$ Number of minutes user has left today
112, 1 CHR$ Node user is on. actual character.
113, 5 Ascii Scheduled EVENT time
118, 2 Ascii A '-1' if EVENT is active or a ' 0'
120, 2 Ascii ' 0' is Placed here by FNET
122, 4 MKS$ Time of day in seconds format when user logged on
126, 1 Ascii The Com port this node uses (0 - 8)
127, 2 Ascii Flag to let FNET know type file xfer being done
129, 1 Char Ansi Detected Flag - Char[0] or Char[1]
130, 13 Ascii Unused by FeatherNet - SPACE filled
143, 2 MKI$ Last Area User was in (0 - 32766 possible)
145 BITMAP Not Currently Used by FeatherNet
FeatherNet v4.00 - Page 59
DOOR.SYS
--------
This is the "generic" door control file. A DOOR.SYS will be created
when a door program is executed if the Sysop has entered a "Y" under the
"DOOR.SYS" column when editing a conference's door information in FNCFG.
The file is a straight ascii file with each line ending with a cr/lf.
COM1: <-- Comm Port - COM0: = LOCAL MODE
2400 <-- Baud Rate - 300 to 57600
8 <-- Parity - 7 or 8
1 <-- Node Number - 1 to 999 (Default to 1)
19200 <-- DTE Rate. Actual BPS rate to use. (300 TO 115200)
Y <-- Screen Display - Y=On N=Off (Default to Y)
Y <-- Printer Toggle - Y=On N=Off (Default to Y)
Y <-- Page Bell - Y=On N=Off (Default to Y)
Y <-- Caller Alarm - Y=On N=Off (Default to Y)
Joe User <-- User Full Name
Anywhere, USA <-- Calling From
555 555-1212 <-- Home Phone
555 555-1213 <-- Work/Data Phone
PASSWORD <-- Password
110 *<-- Security Level
1456 <-- Total Times On
03/14/88 <-- Last Date Called
7560 <-- Seconds Remaining THIS call
126 <-- Minutes Remaining THIS call
GR <-- Graphics Mode GR=Graph, NG=Non-Graph
23 <-- Page Length
Y <-- User Mode - Y = Expert, N = Novice
1,2,3,4,5,6,7 <-- Conferences/Forums Registered In
7 <-- Conference Exited To DOOR From
01/01/99 <-- User Expiration Date (mm/dd/yy)
1 <-- User File's Record Number
Y <-- Default Protocol - X, C, Y, G, I, N, Etc.
0 <-- Total Uploads
0 <-- Total Downloads
0 <-- Daily Download "K" Total
999999 <-- Daily Download Max. "K" Limit
10/22/88 <-- Caller's Birthdate
C:\FNET <-- Path to the MAIN directory (Where USERS file is)
C:\FNET <-- Path to the GEN directory
Bob <-- Sysop's Name (name BBS refers to Sysop as)
Whasmaname <-- Alias name
00:05 <-- Event time (hh:mm)
Y <-- If its an error correcting connection (Y/N)
N <-- ANSI supported & caller using NG mode (Y/N)
Y <-- Use Record Locking (Y/N)
14 <-- BBS Default Color (IBM color code, ie, 1-15)
10 *<-- Time Credits In Minutes (positive/negative)
07/07/90 <-- Last New Files Scan Date (mm/dd/yy)
14:32 <-- Time of This Call (hh:mm)
07:30 <-- Time of Last Call (hh:mm)
6 <-- Maximum daily files available
3 <-- Files d/led so far today
23456 <-- Total "K" Bytes Uploaded
76329 <-- Total "K" Bytes Downloaded
A Piece of Work <-- User Comment
0 <-- Total Doors Opened
0 <-- Total Messages Left
FeatherNet v4.00 - Page 60
FNCONF.@@@
----------
This is the conference "control" file. It hold configuration
information for each conference on the system. The file begins with a 2
byte header (integer) which indicates the length of each conference
record. The number of records is obtained by dividing the size of the
file minus 2 by the conference record size. As an example we read the
first two bytes of FNCONF.@@@ into an integer (ConfRecSize). Currently,
this will equal 500. Checking the size of out FNCONF.@@@ file we find
it to be 1002 bytes. To determine the number of conferences we divide
(1002 - 2) by the ConfRecSize integer (500) and realize we have two (2)
conferences configured. The following is a breakdown of the FNCONF.@@@
file used with FeatherNet BBS version 4.00.
ConfRecSize AS Integer ' Header Record
TYPE ConfNames
Maildir AS STRING * 40 ' Path/name of Conf message File
Bname AS STRING * 25 ' Name of Conference
Xfer AS STRING * 35 ' DIR Listing File name ("DIR.LST")
DpathNm AS STRING * 30 ' DLPATH.LST File name ("DLPATH.LST")
UpathNm AS STRING * 30 ' Public Upload FIle Directory Path
PrivPathNm AS STRING * 30 ' Private Upload Directory path
UlDirFile AS STRING * 30 ' Public Upload DIR Listing File Name
PrivDirFile AS STRING * 30 ' Private Upload DIR Listing File Name
DirMenFile AS STRING * 30 ' DIR Listing Menu File Name
IsEcho AS STRING * 1 ' Is this conf. to be echoed (Char 0=no; 1=yes)
AccLvl AS STRING * 1 ' Security Lvl Req'd to enter conf. (0-255)
RepLvl AS STRING * 1 ' Security Lvl Req'd to REPLY to msg (0-255)
WritLvl AS STRING * 1 ' Security Lvl Req'd to ENTER a msg (0-255)
IsPub AS STRING * 1 ' Is this a public conf (Char 0= no; 1=yes)
NumMblks AS STRING * 1 ' Number of message Blocks - 1 block=1024 msgs
UpDirlvl AS STRING * 1 ' Public Upload Directory Security level
PrivDirlvl AS STRING * 1 ' Private Upload Directory Security level
IndexFile AS STRING * 30 ' Path And name of DIR Index file (if any)
DoorMen AS STRING * 30 ' Path And name of Door Menu File
DoorData AS STRING * 30 ' Path And name of Door Data File
BltnMen AS STRING * 30 ' Path And name of Bulletin menu File
BltnLst AS STRING * 30 ' Path And name of Bulletin List File
PrivateOnly AS STRING * 1 ' Private mail ONLY conference ' \\\\\\\\\
Future AS STRING * 61 ' Future growth - unused by v4.00
END TYPE
Note that each 1 byte STRING is a character whose ASCII value represents
a value 0-255.
FeatherNet v4.00 - Page 61
FNEXTUSR
--------
IF more than 40 total conferences are configured (main board plus 39
conferences), a file called FNEXTUSR is created by FNCFG. This file
maintains conference information for each user which includes the high
message read pointer, mail waiting flag, Joined flag and conference
scan flag. To calculate the size of a record the following is done.
ExtraConfs = (No.Confs - 40) ; Determine how many extended confs.
HiMsgSize = ExtraConfs * 4 ; Determine bytes for Hi Msg Read
; Pointers
BitChars = (ExtraConfs \ 8) ; Determine how many bytes are necessary
; for *each* BITMAP
IF ExtraConfs MOD 8 <> 0 THEN ; If number of conferences divided by 8
BitChars = BitChars + 1 ; if not zero, we add a character
END IF
TotalBitChars = BitChars * 3 ; Total BITMAP bytes needed
ExtRecSize = HiMsgSize + TotalBitChars ; Total FNEXTUSR record length
The file's records are in parallel with the bbs' USERS file - A user
having record number one in USERS also has record one in FNEXTUSR.
Once the record size is calculated and that number of bytes is read from
the record offset in FNEXTUSR, the information is then converted to the
high message read pointers and the appropriate conference flags.
The high message read pointers use 4 bytes for each conference from the
TotalBitChars.
The 4 bytes per conference for high message read pointers are MBF
(Microsoft Binary Format (MSBIN) Single Precision Reals.
The remaining bytes (TotalBitChars) are the conference BITMAP flags.
For each BITMAP (Scan, Mail Waiting, Joined) a BITMAP of BitChars
numbers of bytes is available (they are in this order, too).
Determine the BITMAP flags in the following sequence:
(1) All the Conference scan flags (user wants to scan these conferences)
(2) All mail Waiting flags (user has mail waiting in these conferences)
(2) All Joined Conference Flags (User has/can Joined these conferences)
Bit Flags: If a bit is non zero it is considered ON. A zero bit is
OFF.
FeatherNet v4.00 - Page 62
┌──────────────────────┐
│ Editing System Files │
└──────────────────────┘
┌─────────────────────────────────────────┐
│FNCFG - Editing Files General Information│
└─────────────────────────────────────────┘
┌────────────────────────────────────────────────────────────────────────┐
│Note: Files may be "chained" by adding a "%FileName" to an │
│ existing file. When FeatherNet sees this syntax, it immediately │
│ opens the file name following the "%" and displays it. │
└────────────────────────────────────────────────────────────────────────┘
In the Conference Configuration screens of FNCFG, the Sysop can
modify the "control" files. When a field of a control file is
highlighted, a bar is present at the bottom of the screen. It
says " F2 to Edit [FILENAME] ".
If the file represents a menu or other text file, the
highlighted bar says, " F2 to Edit Ascii Text File or F3 to
Edit Graphics File ".
■ F2. When pressed, the screen to modify appears if this is a
control (LST) file. If this is a menu or text file, it can be
modified now with your favorite text editor (defined in FNETSM).
■ F3. When pressed, the screen to modify appears. This screen is a
graphics rendition of the text file described above. It can
be modified in your favorite graphics editor (defined in FNETSM).
F2/F3 Changeable Files
----------------------
Below is a list of control (LST) files, text, and optional graphics files
that can be modified using the above options.
┌────────────────────────────┐ ┌───────────────────────────────────┐
│ Menus / Text Files │ │ Configuration Files │
├──────────┬─────────────────┤ ├──────────────┬────────────────────┤
│ Filename │ Description │ │ Control File │ Description │
├──────────┼─────────────────┤ ├──────────────┼────────────────────┤
│ MAINMEN │ Main Menu │ │ DOORS.DAT │ Door Control │
│ CONFMEN │ Conference Menu │ │ │ Information. │
│ XFERMEN │ File Transfer │ │ BLT.LST │ Location/FileName │
│ │ Menu │ │ │ of Bulletins │
│ DOORMEN │ Door Selection │ │ DIR.LST │ File Transfer │
│ │ Menu │ │ │ Control Information│
│ BLTMENU │ Bulletin List │ │ DLPATH.LST │ List of directories│
│ SCRIPT │ Script Selection│ │ │ containing files │
│ │ Menu │ │ │ for downloading and│
│ LOGON │ Initial Welcome │ │ │ security Lvl req'd.│
│ │ File │ │ PWRD │ Controls users time│
│ SRWELC1 │ News File - If │ │ │ allowed pr day. │
│ │ Newer than last │ │ RATIO │ Controls User D/L- │
│ │ Call. │ │ │ U/L Ratio. │
│ SRWELC │ Welcome File │ └──────────────┴────────────────────┘
│ │ after Login │
│ NEWUSER │ Shown to New │
│ │ Users After they│
│ │ Complete Login │
└──────────┴─────────────────┘
FeatherNet v4.00 - Page 63
┌────────────────────────────┐
│ Menus / Text Files - Cont.│
├──────────┬─────────────────┤
│ Filename │ Description │
├──────────┼─────────────────┤
│ CLOSED │ Shown to NEW │
│ │ callers when BBS│
│ │ is closed to NEW│
│ │ Callers │
│ EXPWARN │ Subscription │
│ │ Expiration │
│ │ Warning File │
│ EXPIRED │ Shown to Users │
│ │ whose Subscrip- │
│ │ tion has lapsed.│
│ BYE │ Logoff text file│
│ DLWARN │ Displayed prior │
│ │ to any download.│
│ ULWARN │ Displayed prior │
│ │ to any upload. │
│ USRSTAT │ User statistics │
│ │ file. │
└──────────┴─────────────────┘
Security Specific menus. The above "menu" files may be security
level specific. When a user logs into the system, the user sees a
particular menu depending on his or her security level. Alternate
menus are created by appending the name with the security level.
FeatherNet appends a "G" to the filename then the security level is
appended when checking for a 'security level specific" filename.
Following the guidelines, it is simple to see that you should limit your
ascii filenames to 4 or fewer characters to allow for both the graphics
versions and the security level specific versions of files if you desire
to implement these. It is suggested you become familiar with the
basic operation of the software before taking advantage of the more
complex tools available.
┌───────────────────────────┐
│Editing Control (LST) Files│
└───────────────────────────┘
FeatherNet allows you to maintain LST files for each conference. If
desired, each conference may share the same files. Some SysOps may
choose to have unique LST files for some conferences. In the following
text, we go into detail about editing each LST type file. Remember the
terms "LST" and "Control File" are synonymous. These screens are what
you will see after pressing F2 from the Conference Configuration.
FeatherNet v4.00 - Page 64
┌────────┐
│BLT.LST │
└────────┘
╒════════════════════════════════════════════════════════════════════════════╕
│ Bulletin List (BLT.LST) Editor │
│ │
│ │
│ Bulletin Paths & Names
│ ══════════════════════════════ ▓
│ 1) C:\FNET\BLTN-1 ▒
│ 2) C:\FNET\BLTN-2 ▒
│ 3) C:\FNET\BLTN-3 ▒
│ 4) C:\FNET\BLTN-4 ▒
│ 5) C:\FNET\BLTN-5 ▒
│ 6) C:\FNET\BLTN-6 ▒
│ 7) C:\FNET\BLTN-7 ▒
│ 8) C:\FNET\BLTN-8 ▒
│ 9) C:\FNET\BLTN-9 ▒
│ 10) C:\FNET\BLTN-10 ▒
│ ▒
│ ESC=Exit Alt-R=Repeat a Line Alt-I=Insert a Line Alt-D=Delete a Line
│ │
╘═══ 09:59:47 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Each conference has a bulletin listing file entitled BLT.LST. In this
file, the Sysop places the paths and filenames for each bulletin in the
conference. Each path and filename is numbered to correspond with the BLT
menu discussed earlier. Notice at screen bottom that a Sysop may insert,
delete, or repeat a line.
Creating BLT.LST. The BLT.LST holds path information for each
bulletin file. The BLT.LST should normally be on the file server to
allow all nodes access, but may be copied to each local drive. If
bulletins change, however, the BLT.LST must be changed for each node.
From the above example, the following information is gathered. Bulletin
one is located in directory C:\FNET. The file displayed when a caller
invokes bulletin one after joining this particular conference is BLTN-1.
Creating a bulletin. The bulletin text file holds an individual bulletin.
The bulletin # indicates the number to which the file corresponds in the
Bulletin Menu.
■ Since each bulletin is merely a text or graphics file, it may
employ @X Color Codes or ANSI codes.
FeatherNet v4.00 - Page 65
┌───────┐
│DIR.LST│
└───────┘
╒════════════════════════════════════════════════════════════════════════════╕
│ File Directory Configuration │
│ │
│ │
│ DIR Text File Name & Path Hard Disk Subdirectory Sec
│ ═════════════════════════ ══════════════════════ ═══ ▓
│ 1) C:\FNET\DIR1 C:\FNET\DLDS\DIR1\ 10 ▒
│ 2) C:\FNET\DIR2 F:\QB\ 10 ▒
│ ▒
│ ESC=Exit F1=Help F2=Toggle Field Alt-R=Repeat a Line
│ Alt-I=Insert Alt-D=Delete (Press F1 for More Key Combinations) │
╘═══ 10:01:18 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Pressing F2 Toggles the "Hard Disk Subdirectory" field as indicated
below.
╒════════════════════════════════════════════════════════════════════════════╕
│ File Directory Configuration │
│ │
│ │
│ DIR Text File Name & Path Category of These Files
│ ═════════════════════════ ═══════════════════════ ▓
│ 1) C:\FNET\DIR1 FeatherNet BBS Files ▒
│ 2) C:\FNET\DIR2 QuickBASIC/PDS Files ▒
│ ▒
│ ESC=Exit F1=Help F2=Toggle Field Alt-R=Repeat a Line
│ Alt-I=Insert Alt-D=Delete (Press F1 for More Key Combinations) │
╘═══ 10:01:21 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
Each conference has a directory listing type file (DIR.LST). In this
file, the Sysop places the path and filename for each file in a
particular directory. There are four fields: DIR Text File Name &
Path, Hard Disk Subdirectory, Sec, and Category of These Files. The
first three are normally displayed. Below is a further description of
each field.
DIRx Text File Name & Path
--------------------------
Each "DIRx" file contains a list of paths and filenames. In the
example above, the file DIR1 may contain several different paths and
filenames, but not the files themselves.
Hard Disk Subdirectory
----------------------
This represents the hard disk directory (or cd-rom directory) where all
filenames listed in the DIRx file can be found. The directory in this
field holds the physical files whose names are held in the DIR file.
Sec
---
This represents the Security Level required to list the filenames or
download the files listed in the DIRx file being configured.
FeatherNet v4.00 - Page 66
Category of These Files
-----------------------
When the Sysop presses F2, the two previous fields change to a
directory description. This field is displayed to a caller or user
when he or she scans a list of directories.
┌───────────────────┐
│Creating DIRx Files│
└───────────────────┘
Inside the DIR.LST file is a list of DIR text file names and paths. Each
of these text files contains a list of directories that indicate the
location files. A text editor is recommended to edit the DIRx files.
Additionally, you may take advantage of the "LOCALUP.EXE" utility ro
manually add files and descriptions to a DIRx file. See the description
of the DIRxx file which includes the exact format it must be in.
FeatherNet v4.00 - Page 67
┌─────────┐
│DOORS.LST│
└─────────┘
╒════════════════════════════════════════════════════════════════════════════╕
│ Edit DOORS File │
│ │
│ DOOR │
│ Filename Password Sec Login SYS Shell Path to DOOR Files
│ ══════════ ════════════ ═══ ═════ ════ ═════ ══════════════════════════ ▓
│ 1) FNMAIL 10 N Y S C:\FNET\ ▒
│ 2) FERSALE 10 N Y N C:\FNET\ ▒
│ ▒
│ ESC=Exit Alt-R=Repeat a Line Alt-I=Insert a Line Alt-D=Delete a Line
│ │
╘═══ 10:00:10 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
The DOORS.LST file provides a list of all system DOORS. Each conference
has a separate DOORS.LST file although they may share the same file if
no discrepancies exist.
The file consists of seven fields: Filename, Password, Security
level, Login, DOOR.SYS, Shell, and Path to DOOR File. Above is a
DOORS.LST screen that contains these fields and below is discussion of
those fields.
Filename
--------
To identify the DOOR, a name is placed in this field. This represents
the file that a Sysop can call from a DOS prompt to execute the DOOR
program. The filename *must* not be an executable file (one with an
.EXE or .COM extension). The Sysop should create a batch file that
holds the .EXE file as well as any setup information required for the
execution of the DOOR program. Each filename is numbered. This
number should correspond to the DOOR menu discussed earlier.
Note: The batch file created by the sysop *must* not have a ".BAT" file
name extension. FeatherNet uses the Filename in the DOOR.LST file in
creating a "DOOR.BAT" file which is actually used to start the door.
Password
--------
This field contains a password that a user must enter to access a DOOR.
This field may be left blank, but if a password is present, FeatherNet
will prompt a user for the password regardless of the user's security
level.
Security Level
--------------
A user must have this security level or greater to access the DOOR being
configured. Each DOOR has its own security level requirements as a
Sysop may want to restrict usage of certain doors by security level.
FeatherNet v4.00 - Page 68
Login
-----
Y = FeatherNet determines the security level of the caller. If the
user's security level matches the DOOR security level the user is
automatically sent through a DOOR to the respective application
after the welcome, news and security specific files are displayed.
This feature is beneficial for Sysops who want new users to go
through an automatic registration or verification process or to send
specific users immediately into an application.
N = A caller enters FeatherNet and does not enter this door during the
Login process regardless of his/her security level.
DOOR.SYS
--------
Y = A DOOR.SYS file is created to accommodate the DOOR program.
The DOOR.SYS passes some user and system information to the DOOR
program. The Sysop should read a given DOOR program's documentation
to determine id a DOOR.SYS file is necessary.
N = A DOOR.SYS file is not created.
Path To DOOR Batch File
-----------------------
In this field, the Sysop specifies the location of the batch file to run
the DOOR application. The batch file itself must be located in this
directory.
┌─────────────────┐
│REMOTE MODE DOORS│
└─────────────────┘
In remote mode, a DOOR requires a SERIAL port for proper execution.
The DOORS are created like those in local mode, but further
manipulation is necessary. REMOTE Mode DOORS are handled in three
ways:
1. The Serial port routines may be written directly into the "DOOR"
program. This provides greatest control, but the most work.
2. Communication routines ╔═══════════════════════════╗
to initiating the DOOR ║@echo off (No DOS echo) ║
application. A sample ║ctty com1: (COM1 output) ║
batch file to initiate ║type Mytext (function) ║
such a door with the CTTY ║ctty con (Output to ║
command is to the right. ║ screen) ║
The caller sees any ║@echo on (DOS echo on) ║
host or local node ║SR (Load BBS) ║
remains unchanged. ╚═══════════════════════════╝
3. Instead of using the CTTY command, a program called "DOORWAY" may be
used (and is recommended). It also redirects screen output and
keyboard input through the Serial Port, but provides many additional
features that add reliability and further compatibility.
FeatherNet v4.00 - Page 69
┌──────────┐
│DLPATH.LST│
└──────────┘
╒════════════════════════════════════════════════════════════════════════════╕
│ Download Path (DLPATH.LST) Editor │
│ │
│ │
│ Download Paths Security Level
│ ════════════════════════════════════ ═══ ▓
│ 1) E:\FNET40\ 255 ▒
│ 2) E:\FNET4088\ 0 ▒
│ ▒
│ ESC=Exit Alt-R=Repeat a Line Alt-I=Insert a Line Alt-D=Delete a Line
│ │
╘═══ 10:02:21 ═════════════════ F1 = help! ════ins: OFF caps: OFF num: OFF═╛
A BBS usually has several (or many) files available for callers to
download. Downloading is the process by which a caller receives a file from
the host system (usually a BBS). The file is sent over the Modem into
the caller's compueter system. The Sysop places these downloadable files
into Download Directories that are controlled by the DIR.LST file(s).
Additional download paths may be added using the DLPATH.LST file.
DLPATH.LST contains directory listings and a security level. When a caller
wishes to download a file, FeatherNet searches the listed directories for
downloadable files. Above is the DLPATH.LST configuration screen.
The Sysop uses the ALT functions at the bottom of screen to add or delete
download path entries in the DLPATH.LST file. Users may download a file
from one of these specified directories only if his/her security level is
equal to or greater than that specified for a given path.
FeatherNet checks the DLPATH.LST file directories for a file to be
uploaded before it checks the DIR.LST specified directories. Ensure your
downloadable files are located in a directory you know is protected by an
adequate security level. It is anticipated a DLPATH.LST file will
normally be small if needed at all unless a Sysop has many files
available for downloading and desires to limit the number of files in a
single subdirectory for faster location.
FeatherNet v4.00 - Page 70
┌──────────────────────────┐
│Making a File Downloadable│
└──────────────────────────┘
The Sysop can place a file inside one of the directories specified in
DIR.LST or DLPATH.LST to make it available for download. This doesn't
provide a listing for the file. It only places the file in the directory
and only users aware of its existence can download it. To add a file
listing that includes the filename, date, and description, the Sysop has
several options:
As previously discussed, the DIR.LST file holds the names and paths of
several DIRx text files. Each file represents a different directory
which contains the names of files available for downloading within that
directory. Among others, the DIR.LST file consists of DIR Text Filename &
Path and Hard Disk Subdirectory fields.
(1) a. Run FNCFG to edit the DIR.LST file.
b. Add definitions for the new DIR file or locate an existing DIR
file that will eventually hold the file to download.
b. Make note of the Hard Disk Subdirectory and the DIRx file name.
Then exit FNCFG.
c. At the DOS prompt, copy the file to the Hard Disk Subdirectory
listed in the DIR.LST file for the directory in which the file will
eventually be stored.
d. Use a text editor and edit the DIRx filename. Enter the File name,
Size, Date and description. Follow the proper format for the DIRx
file as discussed elsewhere in this documentation.
(2) Use the LOCALUP utility to add the file to a DIRx file and have the
file itself placed in an appropriate Hard Disk Directory.
FeatherNet v4.00 - Page 71
┌──────────────────────────────────────────────────────────┐
│ FeatherNet SYSOP Utilities (FNETSM, FNFILER, LOCALUP) │
└──────────────────────────────────────────────────────────┘
┌─────────────────────────────────────────────┐
│FeatherNet Sysop Maintenance Utility (FNETSM)│
└─────────────────────────────────────────────┘
The FeatherNet Sysop Maintenance Utility (FNETSM) provides several vital
functions to assist in the smooth operation of FNET.
The command line to start FNETSM is: FNETSM C:\FNET
This assumes "C:\FNET" is the NODE directory you wish to run FNETSM
from.
1. User Editor (with on-line context sensitive help)
2. User File Packing and Reindexing
3. User Purging by last date on the system
4. Register users into conferences and Designate CoSysops for Conferences
5. Define the TEXT and ANSI editors used by FNCFG.EXE
Option 1
--------
Allows you to edit user information. You may delete or undelete a user.
There is a 'LIST USERS' function in case you need to check the spelling
of a user's name and/or user number.
Option 2
--------
This will very quickly sort the users file and create updated 'PCBNDX.x'
files which the system uses to locate user records.
Option 3
--------
This option packs (removes deleted users) the users file and then performs
the indexing function in option 2
Option 4
--------
This option allows you to purge users by the last date called. All
users who logged on prior to a date you specify and who have a lower
security level than one you specify will be deleted and purged from your
USERS file by a PACK operation.
Option 5
--------
This option allows you to define your TEXT and ANSI editors used by
FNCFG. You enter the path and name of the editor when prompted. FNCFG
reads this information from a file named "FNETSM.CFG" when it is run.
When editing the File Locations 1 & 2, you will see a highlited bar at
the bottom of the screen which will tell you the "F" key(s) to press to
edit the file whose name is being edited. Some files only allow an
ASCII editor when there is no ANSI version of the file to be created.
When ANSI versions of menus and text files are to be edited, you must
keep in mind the length of the file name *must* be 7 or fewer characters
and there *MUST NOT* be a file extension on the file name. A "G" should
be appended to the ANSI version of a file you wish to maintain both ANSI
and ASCII versions of. FeatherNet will use one ANSI file for menus and
text files vice having you maintain one ascii and one ansi version. The
ANSI codes will be stripped automatically when a caller is not in ANSI
color mode.
FeatherNet v4.00 - Page 72
┌─────────────┐
│FNETSM Cont'd│
└─────────────┘
When FNETSM.EXE is run, the main screen is similar to the one shown
below Although *much* larger.
FeatherNet v4.00 Sysop Maintenance Utility
╒══════════════════════════════════════════════════════════╕
│ [1] Edit Users │
│ [2] Make User Index Files │
│ [3] Pack USERS File │
│ [4] Purge Users by Call Date │
│ [5] Define Text and Graphics Editors │
│ [6] Exit Sysop Utility Program │
│ │
│ Use or press # key to select. Press ENTER when Done │
╘══════════════════════════════════════════════════════════╛
You can use the up/down arrows or press the number of the option to
proceed with.
Option 1 - Edit Users
---------------------
When you select option 1, you are queried to enter the name of a user
to view/edit. You may enter all or part of a name. FNETSM will search
for the first user record matching your response. If this is not the
user record you want to edit, press ALT-L and the search continues.
This may be repeated until no further matches emerge.
When FNETSM "finds" a user record, the edit screen appears. Specific
data may be entered or updated at this time. A sample user record
follows (slightly modified for this documentation).
╒═══════════════════════════════════════════════════════════════════════════╕
│ Number 1 of 402 │
│ │
│ Name : SYSOP Times Called : 4639 │
│ City/State : ANYWHERE, USA