home *** CD-ROM | disk | FTP | other *** search
/ BBS Toolkit / BBS Toolkit.iso / rbbs_pc / viewmrg.zip / RBBSSUB2.MRG < prev    next >
Text File  |  1988-10-25  |  2KB  |  52 lines

  1. * ------------[ BLED merge (c) Ken Goosens ]-------------
  2. * Merge this against RBBSSUB2.BAS to produce D:\LITE\RBBSSUB2.BAS
  3. * RBBSSUB2.BAS:  Date 10-2-1988  Size 130944 bytes
  4. * ------------[ Created 10-25-1988 19:15:07 ]------------
  5. * REPLACING old line(s) by new
  6. 20148 CALL QTPUT(FILE.NAME.HOLD$ + " has these files",1)
  7.       CALL VIEWARC
  8. * ------[ first line different ]------
  9.       CALL VIEWTXT                'ViewArc Mod
  10.       CALL DLVIEWARC                        'ViewArc Mod
  11.       IF SUBROUTINE.PARAMETER = -1 THEN _
  12.          ARC.INDEX = LAST.INDEX + 1
  13.       RETURN
  14.       END SUB
  15. ' $SUBTITLE: 'BADNAME - subroutine to find bad file names'
  16. ' $PAGE
  17. '
  18. '  SUBROUTINE NAME    -- BADNAME
  19. '
  20. '  INPUT PARAMETERS   --     PARAMETER                    MEANING
  21. '                        ACTIVE.MESSAGE.FILE$
  22. '                        ACTIVE.USER.FILE$
  23. '                        CALLERS.FILE$
  24. '                        COMMENTS.FILE$
  25. '                        CONFIG.FILEANAME$
  26. '                        MAIN.MESSAGE.BACKUP$
  27. '                        MAIN.MESSAGE.FILE$
  28. '                        MAXIMUM.VIOLATIONS
  29. '                        PASSWORDS.FILE$
  30. '                        RBBS.BAT$
  31. '                        RCTTY.BAT$
  32. '                        SUBDIR$()
  33. '                        SUBDIR.INDEX
  34. '                        VIOLATION$
  35. '                        VIOLATIONS.THIS.SESSION
  36. '                        Z$                          NAME OF FILE
  37. '
  38. '  OUTPUT PARAMETERS  -- BAD.FILE.NAME.INDEX         1 = FILE NAME IS OK
  39. '                                                    2 = SECURITY BREACH TRIED
  40. '                        VIOLATIONS.THIS.SESSION     NUMBER OF VIOLATIONS
  41. '                        FILENAME$                   NAME OF FILE
  42. '
  43. '  SUBROUTINE PURPOSE -- TO PROTECT RBBS-PC AGAINST THE USE OF BAD FILE NAMES
  44. '                        TO EITHER CRASH THE SYSTEM OR TO BREACH RBBS-PC'S
  45. '                        SECURITY
  46. '
  47.       SUB BADNAME (BAD.FILE.NAME.INDEX) STATIC
  48. '
  49. ' *
  50. ' *  TEST FOR SYSTEM FILE ATTEMPT                                             *
  51. ' *
  52.