home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-03-27 | 508.5 KB | 15,364 lines |
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- D'Bridge EMAIL System
-
- Single-line 1.53 / 27 March '93
-
- Copyright 1987-1993 by Chris Irwin
-
-
-
-
-
-
-
- USER'S MANUAL AND TECHNICAL REFERENCE
-
-
-
-
-
-
-
-
- ------------------------------------------------------------
- Mosaic Press 800-932-4044 Credit card orders
- 358 Oliver Road 513-821-1270 Other inquiries
- Cincinnati, OH 45215 513-821-1387 Data
-
- 201:100/0 DBNET
- 1:108/68 Fidonet
- ------------------------------------------------------------
-
- TABLE OF CONTENTS
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TABLE OF CONTENTS
-
-
-
- GSection Title PageH
- ------- ----- ----
-
- 0.00 NOTE FROM THE AUTHOR 1
- 0.01 HARDWARE / SOFTWARE REQUIREMENTS 2
-
-
- 1.00 GENERAL OVERVIEW 3
-
-
- 2.00 SOFTWARE INSTALLATION 8
- 2.01 BASIC EMAIL SETUP 9
- 2.02 BASIC ECHOMAIL SETUP 12
-
-
- 3.00 SYSTEM CONFIGURATION AND MAINTENANCE 17
- 3.01 BASIC CONFIGURATION 18
- 3.02 DIRECTORY PATHS 27
- 3.03 COMM / MODEM SETUP 34
- 3.04 SCHEDULE MAINTENANCE 44
- 3.05 NODELIST CONFIGURATION 56
- 3.06 PACKET MAIL CONTROL 63
- 3.07 XMAIL CONTROL 71
- 3.08 TIME CONTROL SYSTEM 76
- 3.09 FUNCTION KEYS 81
- 3.10 BBS CONFIGURATION 82
- 3.11 SECURITY MISCELLANEOUS 88
- 3.12 DISK SPACE MINIMUMS 97
- 3.13 ACCOUNTING TRANSLATION 98
- 3.14 ZMODEM PARAMETERS 102
- 3.15 SETUP EDITOR OPTIONS 104
- 3.16 ECHOMAIL AREAS 109
- 3.17 WINDOW COLORS 115
- 3.18 KEYBOARD MACROS 116
- 3.19 TRANSLATION TABLE 117
-
-
- 4.00 SYSTEM IDLE COMMANDS 118
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- TABLE OF CONTENTS
- --------------------------------------------------------------------------------G
-
-
-
-
-
- GSection Title PageH
- ------- ----- ----
-
- 5.00 EMAIL MESSAGE EDITOR 139
- 5.01 USING EDIT MODE 145
- 5.02 USING READ MODE 152
- 5.03 ADVANCED FEATURES 155
-
-
- 6.00 UNDERSTANDING THE QUEUE 158
- 6.01 CREATING A PRIVATE NODELIST 163
- 6.02 DUTIES OF A NETWORK ADMINISTRATOR 165
- 6.03 PUBLIC EMAIL NETWORKS 166
-
-
- 7.00 DBUTIL / UTILITY PROGRAM 167
- 7.01 FIDO AND QUICKBBS STORAGE 170
- 7.02 USING THE SCRIPTING LANGUAGE 171
- 7.03 EXAMPLE SCRIPT FILE 176
-
-
- 8.00 BBS SYSTEMS 177
- 8.01 GENESIS DELUXE BBS 181
- 8.02 MAXIMUM BBS 186
- 8.03 OPUS CBBS 189
- 8.04 PC-BOARD 191
- 8.05 PHOENIX BBS 195
- 8.06 QUICKBBS 198
- 8.07 REMOTEACCESS 200
- 8.08 SUPERBBS 208
- 8.09 SEARCHLIGHT BBS 211
- 8.10 TBBS 214
- 8.11 TELEGARD 217
- 8.12 WILDCAT 222
-
-
- 9.00 GLOSSARY OF TERMS 226
-
-
- A.00 ACKNOWLEDGEMENTS 258
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 0.00 NOTE FROM THE AUTHOR
- 1
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 0.00 NOTE FROM THE AUTHOR
-
- Thank you for selecting D'Bridge, a state-of-the-art electronic mail
- system for the IBM PC. The ability to send and receive data electro-
- nically has now become almost as common as the telephone for business.
- More and more companies are realizing that the most efficient and
- cost-effective way to move data is digital. FAX is fine for printed
- documents and voice is the most direct way to convey a thought; but
- data is the best way for businesses to communicate when the informa-
- tion sent and received becomes routine or needs to be fed directly
- into one or more remote computers for instant processing.
-
- It is rapidly becoming commonplace for companies to have a "data" num-
- ber, just like they had "voice" and "FAX" numbers. In fact, it is al-
- ready possible to replace the "FAX" number with a combined "Data/FAX"
- number, since reasonably inexpensive modems supporting protocols for
- both are already being offered on a fast growing scale.
-
- What can D'Bridge do? Simple - it can move data, programs, documents,
- spreadsheets, pictures, drawings and sounds between continents in just
- seconds or minutes, depending on the size. Anything that can be stored
- in your computer may be automatically transmitted to other computers
- using compatible EMAIL systems anywhere in the world.
-
- D'Bridge isn't alone; there are many other programs out there that can
- communicate with it. We chose to implement the most widely used point-
- to-point EMAIL system in the world, Fidonet. This means you may commu-
- nicate with anyone using the programs: FrontDoor, BinkleyTerm, Intermail,
- Fido, Opus, SEAmail, TIMS, SEAmail, TrapDoor and many others.
-
- D'Bridge is just a beginning; look for our release of many innovative
- products using our EMAIL system as a "hub". The possibilities of how
- D'Bridge can be used are virtually limitless. Worry-free, automated
- communications is the key to many new applications: Shared databases,
- unattended data collection and automatic order processing to name a few.
- I would be happy to discuss your custom application; after all, I am
- still a consultant too...
-
-
- Sincerely,
-
- Chris Irwin
- 201:201/0@dbnet
- 1:110/68@fidonet.org
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 0.01 HARDWARE / SOFTWARE REQUIREMENTS
- 2
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 0.01 HARDWARE / SOFTWARE REQUIREMENTS
-
- GHARDWAREH
-
- GCOMPUTERH
-
- - IBM PC, XT, AT, PS/2 or compatible
- - 512K RAM (640K recommended)
- - Monochrome, CGA, EGA, VGA, PGA adapter and monitor
- - Serial port (if an external modem is used)
- - Printer (optional)
-
- GSTORAGEH
-
- - A hard disk or any other DOS-compatible electronic
- read/write data storage medium with at least 2.5
- megabytes available before installation
-
- GMODEMH
-
- - Hayes or Hayes-compatible modem
- The modem used MUST be capable of using both the
- DTR (Data Terminal Ready) and the CD (Carrier Detect)
- signals.
- - Modem cable (if external)
-
- GTELEPHONE LINEH
-
- - A regular telephone line
- - A "cellular" phone (with a compatible modem)
- - Most PBX systems (check with your vendor)
-
-
- GSOFTWAREH
-
- GOPERATING SYSTEMH
-
- - D'Bridge requires DOS 3.0 or higher (DOS 5.0 suggested)
- - PKZIP.EXE and PKUNZIP.EXE from PKWARE are both required*.
-
-
-
-
- (*PKWARE, Inc., 7545 N. Port Washington Rd., Glendale, WI 53217)
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 1.00 GENERAL OVERVIEW
- 3
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 1.00 GENERAL OVERVIEW
-
- D'Bridge is one of the most flexible EMAIL systems on the market today
- and its menu-driven operation makes it one of the easiest to use. The
- communications between D'Bridge systems use the powerful ZMODEM proto-
- col, ensuring that your data arrives as quickly and accurately as
- possible.
-
- In its simplest form, D'Bridge acts like a messenger between two or more
- points; at its best and most complex, it can be a multi-tired network
- connecting hundreds (or thousands) of cities using a "hub and spoke"
- topology (much like our major airlines and parcel services.)
-
-
- GMESSAGESH
-
- D'Bridge can send messages (text) from one location to another automatically.
- Messages may be prepared by using the built-in D'Bridge Message Editor or a
- third-party product. Messages are a simple and cost-effective way for offices
- to communicate with each other. It is usually more cost-effective to send
- EMAIL messages between offices than to use FAX or TELEX. With a high-speed
- modem, D'Bridge acan transfer hundreds of messages in just a minute or two.
-
-
- GFILESH
-
- Along with messaging, D'Bridge can send files. Word processor files, spread-
- sheets, database files and graphic images are just a few of the types of files
- D'Bridge can transfer. Any file which can be put on a standard DOS storage
- medium may be sent anywhere in the world within minutes using D'Bridge.
-
- GFUNCTION-REQUESTSH
-
- D'Bridge also has the ability to spawn GFUNCTION-REQUESTH server tasks. These
- programs are designed to process received data then generate output to send
- back to the calling sytstem. Examples of function requests are the programs
- that issue "DEMO keys" and collect registration data.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 1.00 GENERAL OVERVIEW
- 4
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DESIGN PHILOSOPHY / BASIC CONCEPTS
-
- D'Bridge is a complex program that allows a user complete control over
- its operation. Four integrated programs are involved in the routine
- operation of the EMAIL system:
-
- GDB.EXEH This is the "shell" program that runs the mailer and editor.
-
- GDB01.151H This is the MAILER portion. It controls your modem
- both answering and originating calls; it can control
- your FAX card or the FAX options inside your modem at
- the same time. Think of the MAILER as a fancy timer/
- clock allowing you to program different "events" to
- happen using a weekly schedule. EMAIL is transmitted
- only when the schedule permits; mail schedules can be
- set up to send all mail at the least-expensive over-
- night rates.
-
- GDB04.151H This is the EDITOR portion. It is very much like a
- word-processor in operation, but instead of documents,
- there are EMAIL messages. The editor allows you to
- enter, read and reply to messages.
-
- GDBUTIL.EXEH This is the utility program. It allows for additional
- functions such as SEND FILE or POLL to be executed from
- a batch file so that nightly data transmissions can be
- automated. With the PURGE option, DBUTIL will purge the
- message base.
-
-
- There are some basic terms that are important to understand when dealing with
- D'Bridge. There is also a complete glossary of terms located in appendix A, but
- here are the ones you will need in order to get started:
-
-
- GEMAILH Electronic mail, or in D'Bridge terms, messages that
- are sent directly between systems or routed through
- a host. EMAIL messages may be public or private and
- may be sent in normal or compressed (XMAIL) form.
-
- GNETmailH NETmail or network mail is the name of the EMAIL message
- area for messages sent directly between systems. Each
- NETmail message has an ORIGIN and a specific DESTINATION
- where it is to be sent.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 1.00 GENERAL OVERVIEW
- 5
- --------------------------------------------------------------------------------G
-
-
- G ECHOmailH ECHOmail is a form of conferencing. When an ECHOmail
- message is entered on your system, it is automatically
- "echoed" to all other systems participating in the given
- conference. ECHOmail messages are generally not private
- since they can be read by the system operator of each
- node receiving it.
-
- ECHOmail conferences are generally topic-specific. For
- example, there may be an ECHOmail conference about SKIING
- and one about SCUBA_DIVING. This provides a means of
- linking lots of people throughout the world in a common
- forum for discussion.
-
- G XMAILH In D'Bridge terms, XMAIL simply means compressed mail.
- Compression is achieved through the use of common com-
- pression/archival programs that store a series of files
- inside a single archive. By default, ARC by System En-
- hancement Associates is used to store and compress the
- mail so that telephone costs may be cut. ZIP, LHA, ARJ,
- PAK and ZOO are also supported as standard compression
- methods.
-
- If you wish to use the XMAIL features of D'Bridge, you
- will need to get one of these supported archive programs:
-
-
- GZIPH PKWARE, Inc.
- 7545 N. Port Washington Rd.
- Glendale, WI 53217
-
- GLHAH Copyright by Haruyasu Toshizaki
- Japan
- Distributed via electronic means
-
- GARJH Robert K. Jung
- 2606 Village Road West
- Norwood, MA 02062
-
- GPAKH NoGate Consulting
- P.O. Box 88115
- Grand Rapids, MI 49518-0115
-
- GARCH System Enhancement Associates
- 21 New Street
- Wayne, NJ 07470
-
- GZOOH Copyright by Rahul Dhesi
- Free noncommercial use permitted
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 1.00 GENERAL OVERVIEW
- 6
- --------------------------------------------------------------------------------G
-
-
- G NETWORKH A NETWORK is a group of computer systems with the
- ability to send EMAIL on a scheduled or continuous basis.
- In D'Bridge, NETWORKS are defined by a NODELIST file.
-
- G NODELISTH A NODELIST is a text file containing a list of EMAIL
- systems in a given NETWORK. The list is in a structured
- form, known as the "St. Louis" format. D'Bridge needs to
- compile the raw list(s) into its database before a new
- nodelist file may be used. If you are joining a public
- NETWORK, you will need to obtain a copy of their NODELIST
- from a "network administrator". If you are setting up a
- private NETWORK, you will need to create your own
- NODELIST file.
-
- G MESSAGEH A MESSAGE is the basis of EMAIL communications. A user
- enters a MESSAGE in the editor and ADDRESSES it to any
- other system in the NODELIST.
-
- G ADDRESSH Each EMAIL MESSAGE has two addresses: the ORIGIN and
- DESTINATION ADDRESS. The ORIGIN is simply the ADDRESS of
- the system on which the message was written and the DESTI-
- NATION is the ADDRESS of the system where the message is
- being sent. In D'Bridge, addresses are broken up into
- four segments: ZONE, NET, NODE and POINT. Each of these
- segments is a number between 0 and 32767. The normal for-
- mat for an EMAIL ADDRESS is ZONE:NET/NODE.POINT.
-
- G ZONEH The ZONE ADDRESS is a number between 1 and 32767 desig-
- nating a NETWORK or geographic region. In the case of pu-
- blic NETWORKS, different ZONES have been used to designate
- completely separate NODELISTS.
-
- G NETH The NET ADDRESS is a number between 1 and 32767 designa-
- ting LOCAL NETWORKS. A LOCAL NETWORK consists of a HOST
- NODE, BOSS NODES and POINTS.
-
- G NODEH The NODE ADDRESS is a number between 0 and 32767 desig-
- nating the ADDRESS of an individual system. If the NODE
- number is 0, the system is a HOST NODE.
-
- G POINTH The POINT ADDRESS is a number between 0 and 32767 desig-
- nating the ADDRESS of an individual system acting as a
- POINT. If the POINT number is 0, the system is a BOSS
- NODE; otherwise, the system uses its BOSS NODE to receive mail.
-
- G BOSS NODEH A BOSS NODE is any system operating with a point address
- of zero. The difference between a BOSS NODE and a POINT
- is that BOSS NODES are listed in the NODELIST of a
- NETWORK, while POINTS are not. A BOSS NODE will HOLD and
- FORWARD EMAIL and files to its POINTS.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 1.00 GENERAL OVERVIEW
- 7
- --------------------------------------------------------------------------------G
-
-
- G HOST NODEH A HOST NODE acts as a collecting point for EMAIL and
- HOST-ROUTED files. When a message and/or file is ROUTED,
- it is automatically FORWARDED for the appropriate NODES.
-
- G EVENTH An EVENT comprises of a number of scheduled parameter
- changes in order to control EMAIL routing or to execute
- a series of DOS commands at preprogrammed intervals.
- The SCHEDULE may hold a maximum of 64 EVENTS that tell
- D'Bridge what to do.
-
-
- D'Bridge features four basic modes of operation:
-
-
- GMAILERH The normal mode of operation, the MAILER mode of D'Bridge
- is normally running 24-hours/day unless you are running
- D'Bridge only at certain times. While in the MAILER mode,
- D'Bridge sends and receives EMAIL and files based on a
- preprogrammed schedule. The MAILER mode offers a completely
- unattended method for scheduled transfers of data between
- personal computer systems.
-
- The user has the ability to control the queue of outbound
- file-transmissions and file-requests as well as XMAIL and
- standard EMAIL. No mail will be sent if the system is
- not left in MAILER mode when not in use by the operator.
-
-
- GEDITORH The EDITOR mode allows you to enter and read EMAIL
- messages sent and received by D'Bridge. The EDITOR is
- a specialized word-processor designed to offer powerful
- functions through a clear and simple user interface.
- The editor can be configured to read hundreds of local and
- ECHOmail areas as well as standard EMAIL.
-
-
- GTERMINALH The TERMINAL mode allows D'Bridge to act as a ANSI
- terminal allowing the user to call other systems such
- as Bulletin Board Systems (BBS) or commercial systems
- such as CompuServe<TM>. This mode provides upload and
- download capability plus the ability to set up a
- custom dialing directory of systems frequently called.
-
-
- GCONFIGURATIONH The CONFIGURATION mode of D'Bridge consists of a series
- of parameter screens providing complete control over
- the operation of the software. There are hundreds of
- user-definable parameters controlling the scheduling,
- communications and routing of the EMAIL. For added
- security, a password may be required to enter the various
- CONFIGURATION screens.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.00 SOFTWARE INSTALLATION
- 8
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 2.00 SOFTWARE INSTALLATION
-
-
- Installing D'Bridge from the release GZIPH file is quick and easy.
-
-
- First, make sure that you mave a copy of both GPKZIP.EXEH and GPKUNZIP.EXEH in
- the DOS PATH. PKZIP is a compression/decompression system available from:
-
- GPKWARE, Inc.H
- G7545 N. Port Washington Rd.H
- GGlendale, WI 53217H
-
- This program is available as a SHAREWARE product and is available for file-
- request from most of our dealers in the DBNET nodelist. It is REQUIRED for
- D'Bridge operation.
-
- Next, unZIP the release file, DB-G153.ZIPH into a subdirectory of your choice.
- Assuming that the ZIP file is on a floppy in drive B: type the following DOS
- commands:
-
- ie.
-
- C>GMD \DBH
- C>GCD \DBH
- C>GPKUNZIP B:DB-153H
-
-
- At this point, you should have three files in the \DB directory that came
- from the release ZIP file:
-
- GDB-153.EXEH
- GDB-153.DOCH
- GREAD.MEH
-
-
- To install or upgrade D'Bridge, simply type the command DB-153 in the \DB
- directory:
-
- C>GDB-153H
-
- The installation program will walk you through the installation process.
- Once the installation is complete, the file GDB-153.EXEH will be erased.
-
-
- Proceed to the next chapter for basic EMAIL configuration.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.01 BASIC EMAIL SETUP
- 9
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 2.01 BASIC EMAIL SETUP
-
- In order to gain a complete understanding of D'Bridge, we suggest that
- you use the following guideline to initially configure the software.
- Using this section, follow along step-by-step as we install an operati-
- onal system.
-
-
- 1. When D'Bridge is first loaded, it will perform a series of tests on
- its environment, files and peripherals. There are several warning
- messages you may see in the LOG window. Here's a summary of these
- warnings and what they mean:
-
-
- GWARNING: Unable to initialize modemH
-
- This warning means that there is a modem defined but D'Bridge
- is unable to communicate with it. The software expects an "OK"
- response when the initialization string is sent to the modem.
- A number of things could cause this problem, the most likely
- being that a cable is loose, the modem is off or something is
- set wrong in the COMM/MODEM setup screen; see SECTION 3.03 for
- more information.
-
-
- GWARNING: 64K free RAM needed for ECHOmailH
-
- If there is not at least 64K of memory free when you run
- D'Bridge, ECHOmail processing is not possible. Increase the
- environment size, remove unnecessary TSR programs, try to
- load DOS into High RAM, if your systems is equipped with that
- feature or, if possible, install additional RAM chips in your
- computer.
-
-
- GWARNING: Unable to open log fileH
-
- The LOG FILE that is defined on the BASIC CONFIG screen has
- an invalid name or can't be created for some reason.
- Check the drive and path; see SECTION 3.01 for more information.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.01 BASIC EMAIL SETUP
- 10
- --------------------------------------------------------------------------------G
-
-
-
- GNOTE: "Demo" key has 27 days left!H
-
- Your demonstration license key will expire in 27 days. This
- warning will only appear if you are running a demo copy of
- D'Bridge. This is here for two reasons: to remind you that
- the software is not free and to make sure that you order a
- permanent license before your demo key expires.
-
-
- GERROR: Insufficient disk space on C:H
-
- There is not enough disk space for D'Bridge to operate. This
- is based on the values established on the DISK MINIMUMS screen.
- The solution to this problem is either to free some disk space
- on the "offending" drive or use DB SETUP to change the DISK
- MINIMUMS. (Typing "DB SETUP" from the DOS command line will
- allow you to use the configuration menus without D'Bridge
- coming online).
-
-
- 2. When the top-left corner of the screen says "IDLE," you may press
- the ESC key to display the main menu. Pressing the ESC key a second
- time will return the system to IDLE mode. Select menu items by
- using the ARROW keys to move to the desired option, then press ENTER.
- Pressing the first letter of any option will select that option im-
- mediately without any other keystrokes.
-
-
- 3. On the EDITOR menu, select the SETUP EDITOR OPTIONS option.
- (Pressing ESC-E-S is a quick way of getting to this menu from the
- IDLE state.) Choose answers for all the fields on this screen.
- If you're not sure about a field, leave it blank or accept the pre-
- programmed "default"; refer to SECTION 3.15 for more information.
-
-
- 4. On the CONFIG menu, select each of the following options and
- fill-in all the fields with the appropriate information. Again,
- if you don't understand something, just accept the "default"
- value or leave it blank.
-
- Screen Section
-
- BASIC CONFIGURATION 3.01
- DIRECTORY PATHS 3.02
- COMM/MODEM SETUP 3.03
- NODELIST CONFIGURATION 3.05
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.01 BASIC EMAIL SETUP
- 11
- --------------------------------------------------------------------------------G
-
-
- GH
-
-
-
- 5. If you run a bulletin board system (BBS,) setup the information on
- the ADVANCED MENU, BBS CONFIGURATION screen; refer to SECTION 3.10
- for more information on this screen.
-
-
- 6. Next, if there are certain mail schedules required for your
- NETWORK, you can set them up in the SCHEDULE MAINTENANCE option
- of the CONFIG menu. Typically, a NETWORK will have at least one
- MAIL EVENT each night. During these events, EMAIL and files are
- allowed to be sent; this allows EMAIL entered during the day to
- be transmitted at night, yielding the highest savings in tele-
- communication costs. See SECTION 3.04 for more information.
-
-
- 7. At this point, your system should be configured for basic EMAIL
- operation. Assuming that you defined a NODELIST on the NODELIST
- CONFIGURATION screen, it must be compiled before D'Bridge can use
- it. The NODELIST always gets compiled when the system is brought
- up and a new NODELIST exists. If you haven't left the program,
- you can force a nodelist compile by using the BUILD NODELIST
- DATABASE on the UTILITIES menu. This process takes a few minutes,
- so be patient.
-
- 8. Now EMAIL is fully configured and you may continue by reading
- SECTION 2.02, BASIC ECHOMAIL SETUP.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.02 BASIC ECHOMAIL SETUP
- 12
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 2.02 BASIC ECHOMAIL SETUP
-
- It is assumed you've completed the previous section and set up most
- of the parameters on all the menus listed. If you haven't done this,
- please go back and read the previous section as you configure D'Bridge.
-
- Before you configure the ECHOmail subsystem, it is a good idea to have
- a general understanding of what it is and how it works. Once properly
- configured, the D'Bridge ECHOmail processor is completely automatic in
- operation.
-
-
- - What is ECHOmail?
-
-
- ECHOmail is a facility allowing for EMAIL-based conferencing in
- any number of message areas at the same time. An ECHOmail message
- differs from a NETmail message only in that there is no DESTINATI-
- ON ADDRESS for an ECHOmail message; it gets sent to ALL systems
- participating in a given conference.
-
- With ECHOmail, you have the capability of sharing ideas with other
- people in SPECIAL INTEREST GROUPS or SIGS. A conference is created
- for each topic of discussion and you may participate in as few or
- as many as you wish. When you enter a message, it is automatically
- forwarded to all the other nodes you are linking to the conference.
- In turn, all the other nodes forward the message to all the nodes
- they link to; the process continues until your message has been seen
- by every system participating in the conference. Your message can
- be sent to THOUSANDS of systems if a conference is interesting
- enough to attract a large and widespread "audience"!
-
- ECHOmail is a unique form of communications. People living thousands
- of miles apart can carry on a public discussion on any topic or in-
- terest they have in common. During the Gulf War the CNN television
- network featured a report about D'Bridge being used for fast commu-
- nications between American soldiers and their families at home.
- In fact, within several days a special purpose all-D'Bridge SaudiNet
- had been set up for this particular purpose. While it took regular
- mail several weeks to get to its destination, D'Bridge carried Mega-
- bytes of messages back and forth between the Gulf Region and the
- States within minutes!
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.02 BASIC ECHOMAIL SETUP
- 13
- --------------------------------------------------------------------------------G
-
-
- An example of some public ECHOmail conferences anyone may partici-
- pate in are:
-
- DBRIDGE D'Bridge users conference
- HUMOR Sick jokes and humor
- POLITICS International political discussion
- SYSOP International Sysop ECHO
- ZMODEM Discussion about the ZMODEM protocol
-
- For more information about how to receive public ECHOmail, contact
- any of our support nodes and we'll be glad to help you.
-
-
- - How does ECHOmail work?
-
- Each ECHOmail conference is actually an entire network within
- itself. An ECHOmail network is defined by its TOPOLOGY or the
- way in which the network interconnects. The following chart
- describes the topology of an ECHOmail conference from my system's
- point-of-view. (This is just an example...)
-
-
- --------------------
- 1:110/68 (my system)
- ---------+----------
- |
- |
- |
- /-----------+------------+-----+-----+-------------+-------------\
- | | | | | |
- ---+--- ----+---- ----+---- ---+----- ----+----- ----+-----
- 1:105/3 1:107/150 1:150/613 1:3601/14 2:512/1006 1:110/68.1
- ---+--- --------- --------- ---+----- ----+----- ----------
- | | |
- +-----------+------------\ | +-------\
- | | | | | |
- ---+---- ---+---- ----+---- ---+----- ---+----- |
- 1:105/10 1:105/50 1:105/300 1:3601/14.1 2:280/280 |
- -------- -------- ----+---- --------- --------- |
- | |
- +----------------\ |
- | | |
- -----+------ -----+------ -----+------
- 1:105/300.14 1:105/300.68 2:512/1006.1
- ------------ ------------ ------------
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.02 BASIC ECHOMAIL SETUP
- 14
- --------------------------------------------------------------------------------G
-
-
-
- To understand what topology is and how messages get to all the
- systems in the conference, let's take an example of a message
- entered on 1:105/300.68 replying to a message from 2:512/1006.1...
-
- The message would pass through the following systems to make it
- to its final destination:
-
- 1:105/300.68, 1:105/300, 1:105/3, 1:110/68, 2:512/1006, 2:512/1006.1
-
- This could take anywhere from a few hours to a few days depending
- on the events running on the different systems; the message must
- be forwarded through four different systems before making it to
- 2:512/1006.1!
-
-
- You will notice the topology (interconnection) is in the form of a
- tree starting with my address at the top. ECHOmail topology is
- different from every system's point-of-view. In the above network,
- there may be links I am not aware of. For example, I have no way
- of knowing to which points 1:105/300 is sending the ECHOmail.
- The tree looks completely different from his point-of-view.
-
- The main thing to remember is never to have more than once "source"
- of an ECHO. It is fine to forward an echo to several other systems,
- but make sure all topology follows this tree structure and never
- causes any loops.
-
- Most networks have an ECHOmail coordinator whose job it is to ensure
- the validity of the local network topology. If you are a member of
- a public network, you should always contact the ECHOmail coordinator
- before setting up any ECHOmail links.
-
-
- IMPROPER TOPOLOGY ACCEPTABLE TOPOLOGY
-
- /-----------\ /-----------\
- | | | |
- ---+--- ---+--- ---+--- ---+---
- 1:134/2 1:134/5 1:134/2 1:134/5
- ---+--- ---+--- ---+--- ---+---
- | | | |
- ---+--- ----+---- ---+--- ----+----
- 1:134/3 1:134/150 1:134/3 1:134/150
- ---+--- ----+---- ------- ---------
- | |
- \-----------/
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.02 BASIC ECHOMAIL SETUP
- 15
- --------------------------------------------------------------------------------G
-
-
-
-
- OPTIMUM TOPOLOGY
- System FORWARD TO a
- ------ ---------- -------
- 1:134/2 1:134/3 1:134/5 1:134/150 1:134/2
- 1:134/3 1:134/2 ---+---
- 1:134/5 1:135/2 |
- 1:134/150 1:135/2 /-----------+-----------\
- b | c | d |
- ---+--- ---+--- ----+----
- 1:134/3 1:134/5 1:134/150
- ------- ------- ---------
-
-
- While configuring basic ECHOmail capabilities, read the follo-
- wing sequence of instructions to gain a greater understanding of
- D'Bridge.
-
-
- 1. From the CONFIG menu, select the PACKET/MAIL CONTROL screen.
- Using this screen, set the ECHOmail-related parameters like
- this:
-
- Inbound mail handling? Automatic
- Kill null msgs? Yes
- Kill In-transit msgs? Yes
- In-transit rescan? Yes
- Secured ECHOmail only? No
- Save ECHOmail SEENBYs? No
- Save duplicate messages? No
- Auto-add ECHOmail areas? No (for now)
- Accept AREAFIX requests? Yes
- Remove empty PASSTHRUs? Yes
-
-
- 2. Next, select the XMAIL CONTROL screen. Here, you should
- already have defaults displayed for each of the compression
- commands. If you are using different archive programs than
- the ones specified, change them as appropriate, but remember
- the formats of the ARC, ZIP, LHA, ARJ, PAK or ZOO files must
- be the same.
-
- Specify "30" for "XMAIL processing interval"
- Specify "200" for XMAIL packet size limit"
-
- XMAIL uses the ARC program by default, but you may specify
- which compression methods to use for which systems on this
- screen.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 2.02 BASIC ECHOMAIL SETUP
- 16
- --------------------------------------------------------------------------------G
-
-
- GH
-
-
-
- 3. On the ADVANCED menu, select the DISK SPACE MINIMUMS screen.
- D'Bridge comes preprogrammed with suggested minimum disk
- space criteria. If you plan to use more than one hard-drive
- to store the message bases or queue directory, make sure you
- specify minimums for them on this screen.
-
-
- 4. On the EDITOR menu, select the ECHOMAIL AREAS screen.
- Following the directions listed in SECTION 3.16, create all
- the ECHOmail areas you will be using. In the FORWARD TO
- fields, list the addresses of the systems you want to set
- up ECHOmail links for.
-
-
- 5. That's all there is to it. For ECHOmail to work, you must
- verify the following things:
-
- a. D'Bridge reports at least enough free memory as it takes to
- run the compression and decompression programs specified on
- the XMAIL CONTROL screen. When D'Bridge first comes online,
- it says how many bytes of memory are available. Typically,
- this must be around 100K, depending on the compression
- programs you are using.
-
- b. The compression programs specified must exist in the current
- default path.
-
- c. There is enough free disk space; there will be a warning
- at the bottom of the screen if disk space is too low to
- unpack or forward ECHOmail.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.00 SYSTEM CONFIGURATION AND MAINTENANCE
- 17
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.00 SYSTEM CONFIGURATION AND MAINTENANCE
-
- D'Bridge is configured by using a series of configuration options on the
- GEDITORH, GCONFIGH and GADVANCEDH menus. These options give you complete
- control over all features and settings and, if improperly set, result in bad
- performance or malfunction. It is therefore advised that only the system
- operator have access to the maintenance functions. Configuration screens may
- have a password assigned, using the GConfig passwordH parameter on the GBASICH
- GCONFIGURATIONH screen.
-
-
- The following menu options comprise the configuration/maintenance sub-system
- of D'Bridge:
-
-
- GSetup editor optionsH
- GECHOmail areasH
- GKeyboard macrosH
- GTranslation tableH
- GBasic configurationH
- GDirectory pathsH
- GComm/modem setupH
- GSchedule maintenanceH
- GNodelist configurationH
- GPacket/Mail controlH
- GXMail controlH
- GTime adjustment dataH
- GFunction keysH
- GBBS configurationH
- GSecurity/MiscellaneousH
- GDisk space minimumsH
- GAccounting/TranslationH
- GZMODEM parametersH
- GXport configurationH
- GWindow colorsH
-
-
-
- All these options are described in detail in the following sections.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 18
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.01 BASIC CONFIGURATION
-
-
- The GBASIC CONFIGURATIONH screen allows control over the "basic" functions
- of D'Bridge such as:
-
-
- - System log
- - Primary and Alias EMAIL addresses
- - System name
- - Operator name
- - Location or City
- - Data phone number
- - Flags
- - Alarms
- - Configuration password
-
-
-
-
- SYSTEM LOG LEVEL
-
- System log level: GVerboseH (GNHone/GTHerse/GVHerbose/GDHebug)
-
- This controls the level of detail being written to the system log
- file. D'Bridge allows three levels of activity logging; it is high-
- ly recommended you select VERBOSE until you are familiar with the
- complete operation of D'Bridge Email System.
-
- /---------+----------------------------------------------------------------\
- | GNONEH | Creates NO log whatsoever. Using this option, problems will |
- | | be difficult to resolve, once detected. |
- | | |
- | GTERSEH | Writes only the important data, such as connections, events, |
- | | and file-transfer information. |
- | | |
- | GVERBOSEH | Writes ALL information displayed in the log window. |
- | | |
- | GDEBUGH | Same as VERBOSE, except the times are recorded in the log |
- | | using fractional seconds. (HH:MM:SS.hh) |
- \---------+----------------------------------------------------------------/
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 19
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PURGE LOG AFTER
-
- Purge log after: G7 H (days)
-
- This specifies the number of days to retain the information in the system
- log file. Every day, all log entries older than the specified number of
- days will be erased from the current log file. This purge occurs during
- the GAutoUpdateH event at midnight.
-
- * NOTE * This feature is not yet implemented.
-
-
-
-
- LOG FILENAME
-
- Log filename: GC:\DB\DBRIDGE.LOG H
-
- D'Bridge normally keeps a "log" of all activity so that you may review
- its performance. Here, you specify the name of the file (including the
- directory if you wish) to which D'Bridge will write its log. This file
- contains the information displayed in the upper-left window including
- such data as incoming and outgoing calls, file-transfer statistics and
- event activation.
-
-
-
-
- CPS DISPLAY UNIT
-
- CPS display unit: GbpsH (GbpsH/GcpsH/GkpmH/G%H)
-
- This setting determines the method to use when reporting the effective speed
- of a data transfer. These measurements are displayed in the ACTIVITY window
- during an online mail session. The value of this parameter has absolutely
- no effect on the actual speed of a transfer.
-
- /-----+----------------------------------------------------------------\
- | GbpsH | Bits per second @ 10 bits per byte. ie. 17100 bps |
- | | |
- | GcpsH | Characters or bytes per second. " 228 cps |
- | | |
- | GkpmH | Kilobytes per minute. (cps x 1024) " 94.2 kpm |
- | | |
- | G%H | Percentage of reported baud rate. " 113.2% |
- \-----+----------------------------------------------------------------/
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 20
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PRIMARY ADDRESS
-
- Primary address: G1:110/68.1 H
-
- This specifies your primary system address. This (like all addresses)
- must be in the format: <GZONEH:GNETH/GNODEH.GPOINTH@GdomainH>
-
- If you are a member of an already-existing network, contact your network
- coordinator for an address assignment. If you're not sure, just pick
- arbitrary numbers for now and change them later.
-
- /--------+------------------------------------------------------------\
- | GZONEH | Continent or nodelist designator 1=US, 2=Europe, etc. |
- | | |
- | GNETH | Usually represents a local calling area (1..32767.) |
- | | |
- | GNODEH | Specific system address within a ZONE and NET. |
- | | |
- | GPOINTH | Zero unless running as a "point" of another system. |
- | | |
- | GDOMAINH | * NOTE * Domains are not supported yet. |
- \--------+------------------------------------------------------------/
-
-
-
-
- ALIAS ADDRESSES
-
- Alias addresses: G201:201/0 FOR 201:ALL H
-
- This specifies your secondary (alias) addresses. The field must be in the
- format: <GaddressH> [FOR <GfilterH>]
-
- If you are a member of multiple networks, specify your main address in the
- "Primary address" field and all other origin addresses here. The filter
- controls the automatic alias function. In the above example, any mail,
- AREAFIX requests or transactions with any zone 201 address will be sent
- using 201:201/0 as the origin address. The primary address is used in
- all cases where there is no match with an alias address filter.
-
- (See GPRIMARY ADDRESSH for information about EMAIL address formats.)
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 21
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SYSTEM NAME
-
- System name: GFactory Second Parachutes, Inc. H
-
- When D'Bridge communicates with a remote site, the SYSTEM NAME is
- displayed on the other system's screen along with OPERATOR NAME, CITY
- and your primary and alias addresses.
-
- This field should match the SYSTEM NAME field of your nodelist entry.
-
-
-
-
- SYSTEM CITY
-
- System city: GMiddletown, OH H
-
- When D'Bridge communicates with a remote site, the SYSTEM CITY is
- displayed on the other system. Make sure it is not duplicated in
- the SYSTEM NAME field (it would be redundant...).
-
- This field should match the CITY field of your nodelist entry.
-
-
-
-
- OPERATOR NAME
-
- Operator name: GChris Irwin H
-
- When D'Bridge communicates with a remote site, the OPERATOR NAME is
- displayed on the other system and placed in its system log file.
- This name will also be used in the "FROM" field in the editor, when
- entering a NETmail or ECHOmail message.
-
- This field should match the OPERATOR field of your nodelist entry.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 22
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DATA PHONE
-
- Data phone: G1-513-821-1387 H
-
- When D'Bridge communicates with a remote site, the DATA PHONE field
- is transmitted to the other system for automatic addition to their
- nodelist database. If you fail to specify this number correctly,
- it will not be possible for the remote site to return an answer to
- your mail directly.
-
- If you are using a voice line or do not wish to disclose this number
- to the public, DO NOT LIST IT HERE. Use "G-Unlisted-H" to designate
- the number as private. This data is exchanged during the initial
- EMSI handshake.
-
- * NOTE * For proper translation, phone number MUST be in the format:
-
- <GCOUNTRY CODEH>-<GCITY CODEH>-<GNUMBERH>
-
-
-
-
- CAPABILITY FLAGS
-
- Capability flags: GXX,CM,V32 H
-
- This specifies your system's capabilities. Each Gcapability flagH is
- separated by commas. These flags are transmitted to the remote site
- during the initial EMSI handshake. With this information stored in
- a system's nodelist, it is possible to determine modem type, hours of
- operation and file-request capability. Following is a partial list
- of standard capability flags:
-
- /-----+----------------------------------------------------------\
- | GCMH | Continuous mail system. (On 24-hours every day) |
- | | |
- | GXXH | WaZOO file-requests and update-requests are accepted. |
- | | |
- | GV32H | Modem conforms to the V.32 standard. |
- | | |
- | GHSTH | Modem conforms to the US Robotics HST standard. |
- | | |
- | GPEPH | Modem conforms to the Telebit Trailblazer standard. |
- \-----+----------------------------------------------------------/
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 23
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- AUDIO ALARMS
-
- Audio alarms? GYesH (GYHes/GNHo)
-
- This parameter controls the PC's speaker, enabling or disabling the
- audio alarms. These alarms will alert the operator of incoming calls
- and new mail received. If you specify GNoH, all automatic alarms will
- be disabled.
-
-
-
-
- ALARM HOURS
-
- Alarm hours: G24 hoursH
- -or-
- Alarm hours: G08:00H until G23:00H
-
- This parameter controls the time of day during which the audio alarms
- may be heard. This has no effect if the GAudio alarmsH are disabled.
-
- Either specify nothing (for 24 hours) or enter both starting and ending
- times. Use 24-hour format to describe times after 12 noon. If the
- starting time is before the ending time, the period includes midnight.
-
-
-
-
- RING SIGNAL
-
- Ring signal? GYesH (GYHes/GNHo)
-
- This parameter enables or disables the PC's speaker when the phone is
- ringing because of an incoming call. This has no effect unless the
- GAnswering methodH is configured for GHardwareH or GRingMasterH on the
- COMM/MODEM SETUP screen.
-
- This signal is only heard during the allowed time period.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 24
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- CALL ALARM
-
- Call alarm: GT120L8CGL4E H
-
- This parameter would normally be blank, indicating that the standard
- alarm tones should be used. However, some people get tired of hearing
- the same alarm every day, so this field gives you the opportunity to
- write your own musical alarm. Either specify the music codes or the
- name of a text file containing the notes.
-
-
- Standard ANSI music codes are used, in fact, they are the same as the
- "PLAY" statement in MicroSoft's BASICA. Following is a chart of legal
- music commands:
-
-
- /--------+--------------------------------------------------------\
- | GAH .. GGH | The musical notes A thru G. A note may be followed |
- | | by an accidental ('G#H' or 'G+H' for sharp and 'G-H' for |
- | | flat.) Additionally, a note (With optional sharp or |
- | | flat) may also be followed by a number denoting the |
- | | note length (1 for a whole note thru 64 for a 64th) |
- | | The note, with optional accidental and length, may |
- | | also be followed by one or more dots ("G.H"), each of |
- | | which extends the note by one half of its existing |
- | | value. For example, two dots produce a length 9/4ths |
- | | the original value, and three dots 27/8ths the value. |
- | | |
- | GLHn | Specifies the default length of the notes following |
- | | ("n" must be G1H for a whole note thru G64H for a 64th |
- | | note.) The default value is G4H (quarter note.) |
- | | |
- | GMHz | Specifies the fraction of the note length that the |
- | | note is actually sounding. "z" is either "GSH," "GNH" |
- | | or "GLH", which have these meanings: |
- | | |
- | | GMSH Music staccato (3/4 of note length) |
- | | GMNH Music normal (7/8 of note length) |
- | | GMLH Music legato (all of note length) |
- | | |
- | GOHn | Specifies the octave in which the notes following |
- | | are to be played (G0H thru G7H). The initial default |
- | | octave is G3H, which is the octave beginning at |
- | | middle C. |
- | | |
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 25
- --------------------------------------------------------------------------------G
-
-
- GH
-
-
- | GPHn | Specifies that no sound is to be made for an |
- | | interval. "n" (optional) is the note length (G1H |
- | | for a whole note thru G64H for a 64th note.) If "n" |
- | | is omitted, the current default note length is used. |
- | | One or more dots may follow, each of which extends |
- | | the rest by one half of its existing value. |
- | | |
- | GTHn | Specifies the tempo in beats per minute (G32H thru |
- | | G255H.) The initial default value is G120H. |
- \--------+--------------------------------------------------------/
-
-
-
-
- SPECIAL ALARMS
-
- Special alarms: G135/ALL T180L8O4GGGAAACD. H
-
- If you would like to be notified when certain systems call, specify
- the address followed by the music codes you wish to hear. The format
- for the music is specified in the preceding section. The alarm will
- be heard after the call is complete, but only if new messages or files
- have been received.
-
-
-
-
- CONFIG PASSWORD
-
- Config password: GSECRET H
-
- In a corporate environment where there may be several people using the
- EMAIL system, it may be desirable to put a "lock" on the configuration
- menu to prevent accidental changes of the D'Bridge configuration. If
- a password is specified here, then it must be entered when any of the
- SETUP menu options are selected. It only needs to be entered once for
- each time D'Bridge is run.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.01 BASIC CONFIGURATION
- 26
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- HISTORY DAYS
-
- Keep history for: G7 H (days)
-
- D'Bridge automatically maintains history files for INBOUND and OUTBOUND
- EMAIL calls as well as ECHOmail and AREAFIX requests. These files are
- automatically purged every night at midnight. This field defines how
- many days of history to keep before purging it. The default value for
- this option is 7, providing one week's history.
-
-
-
-
- DISPLAY TIMEOUT
-
- Display timeout: G5 H (Minutes)
-
- D'Bridge features a built-in "screen-saver" which will blank your video
- screen after a specified period of inactivity. The DISPLAY TIMEOUT
- parameter specifies the number of MINUTES of inactivity before the
- screen goes blank. If a call comes in, a scheduled event starts, or you
- press any key, the screen will re-display and the timer starts over.
- When the screen is blank, D'Bridge is still fully-functional - just
- waiting for something to happen! If you do not want the screen to ever
- go blank, enter a zero ("0") and the display timeout will be disabled.
-
-
-
-
- BLANKOUT GRAPHICS
-
- Blankout graphics? GYesH (GYHes/GNHo)
-
- When the D'Bridge screen is blanked due to inactivity, you have the
- option to display "blankout graphics." If you answer YES to this
- question, there will be a bouncing pattern of dots that will tell you
- at a glance D'Bridge is still running and you haven't had a system
- crash or something terrible like that. Most computers hate to be bored
- and do nothing all day; blankout graphics make your system happy by
- giving it something to do when nothing else is going on...
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 27
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.02 DIRECTORY PATHS
-
-
- The GDIRECTORY PATHSH screen allows you to set which drives and subdirectories
- D'Bridge will use. Parameters include:
-
- - Network mail storage
- - Inbound files path
- - Temporary queue path
- - Outbound queue path
- - Script file path
- - Bad ECHOmail path
- - New ECHO area path
- - "ABOUT" and "FILES" filenames
- - Request paths
- - Specific requests
- - Inbound, outbound, ECHOmail and AREAFIX history
-
-
-
-
- NETWORK MAIL STORAGE
-
- Network mail storage: GFido H (GFHido/GQHuickBBS)
-
- D'Bridge gives you the option of two storage methods for NETmail:
-
- /----------+---------------------------------------------------------------\
- | GFIDOH | This method uses one .MSG file for each message. This has |
- | | the advantage of being compatible with a great number of |
- | | third-party utility programs. |
- | | |
- | GQUICKBBSH | This method uses a single set of database files for all the |
- | | messages. The advantage is increased speed and a savings |
- | | of disk space. |
- \----------+---------------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 28
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NETWORK MAIL PATH
-
- Network mail path: GC:\DB\MESSAGES H
-
- Specify the directory path to use for Fido-style NETmail messages.
-
- This directory will contain the files such as:
-
- GDirectory of C:\DB\MESSAGESH
-
- G1 MSG 1847 12-06-91 11:15aH
- G2 MSG 1511 12-06-91 11:15aH
- G3 MSG 1459 12-06-91 11:54pH
- .
- .
- Gnnnn MSG 505 12-15-91 11:07aH
-
-
-
-
- QUICKBBS AREA NUMBER
-
- QuickBBS area number: G17 H
-
- Specify the area number you would like to use for NETmail messages
- using the QuickBBS message base. (G1H-G200H)
-
-
-
-
- INBOUND FILES PATH
-
- Inbound files path: GC:\DB\FILES H
-
- This designates the drive and path for the directory where inbound
- files will be stored. Make sure there is always enough disk space
- available to store any files which may be received. This may be
- changed at any time without adversely affecting the system, as long
- as the specified directory path actually exists.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 29
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TEMPORARY QUEUE PATH
-
- Temporary queue path: GC:\DB\PACKETS H
-
- This designates the drive and path for the temporary directory where
- the outbound NETmail queue will be created.
-
- * NOTE * GAll files in this directory will be automatically erasedH
- Geach time the queue is rebuilt.H
-
-
-
-
- OUTBOUND QUEUE PATH
-
- Outbound queue path: GC:\DB\QUEUE H
-
- This designates the drive and path for the outbound queue directory.
- XMAIL archives and poll, transmit, and request queue entries are
- stored in this directory.
-
-
-
-
- SCRIPT FILE PATH
-
- Script file path: GC:\DB\SCRIPTS H
-
- This designates the drive and path where the dialing script files
- are located. Script files provide an alternate method of dialing
- when using carriers other than standard long-distance telephone
- lines.
-
-
-
-
- BAD ECHO PATH
-
- Bad echo path: GC:\DB\BADECHO H
-
- This designates the drive and path where invalid or unknown ECHOmail
- messages should be stored. The GBADECHOH messages are stored in Fido
- format and may be accessed using area 9999 in the editor.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 30
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NEW ECHO PATH
-
- New echo path: GC:\DB\NEWECHO H
-
- This designates the drive and path where Fido-style ECHOmail message
- bases will be created if GAuto-add areasH is configured for "GFHido."
-
- * NOTE * See GPACKET/MAIL CONTROLH for further information.
-
-
-
-
- QUICK DIRECTORY PATH
-
- Quick directory path: GC:\QUICKBBS H
-
- This designates the drive and path where the QuickBBS database files
- will be stored. If they do not already exist, D'Bridge will create
- them automatically. The following files are used:
-
- GDirectory of C:\QUICKBBSH
-
- GMSGINFO BBS 406 06-05-92 11:01aH
- GMSGIDX BBS 2346 06-05-92 11:01aH
- GMSGHDR BBS 146234 06-05-92 11:01aH
- GMSGTOIDX BBS 28152 06-05-92 11:01aH
- GMSGTXT BBS 1012480 06-05-92 11:01aH
-
-
-
-
- DFB PATH
-
- DFB path: GC:\DB\DFB H
-
- This designates the drive and path where the DFB files are located. This is
- for the GD'Bridge FileBaseH indexing system.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 31
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ABOUT FILENAME
-
- "ABOUT" filename: GC:\DB\110-68.TXT H
-
- The "ABOUT" file is used mainly with the "Public Amateur Network"
- to contain general information about your system. The "ABOUT" file name
- should specify the name of a text file to be transmitted when a file-
- request for "ABOUT" is received. (For more information, see the section
- about file-requests.)
-
-
-
-
- FILES FILENAME
-
- "FILES" filename: GC:\DB\110-68.LST H
-
- The "FILES" file is used primarily with the "Public Amateur Network"
- to provide a list of all requestable files on your system. The GFILESH
- GfilenameH should point to this text file or archive.
-
-
-
-
- REQUEST PATHS
-
- Request paths: GC:\PRIVATE\ SECRET H
-
- D'Bridge has a feature allowing other systems to call in and request
- files from your system. If you wish to enable this option, you must
- specify which directories will be available for request. You may also
- specify a password that must accompany a request. If you use no pass-
- word, any system will have access to the specified directory.
- The format for the request paths is:
-
- <GDIRECTORY PATHH> <GOPTIONAL PASSWORDH>
-
- Where password is an optional parameter. Any number of directories may
- be specified in the REQUEST PATHS window. Make sure to use passwords
- on any directory containing sensitive or confidential information.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 32
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SPECIFIC REQUESTS
-
- Specific requests: GDBRIDGE C:\FREQ\DB*.ZIP H
-
- This window allows you to specify any number of "magic filenames" that
- may be requested from your system. An example of this might be where
- you distribute a newsletter and the filename changes every month. You
- might have a line like:
-
- GNEWS \NEWSLTR\PC-NEWS.021H
-
- The above line means that when a file-request arrives for "NEWS" - the
- file \newsltr\pc-news.021 will be transmitted instead of searching the
- directories specified in REQUEST PATHS. The format for this window is:
-
- <GMAGIC NAMEH> <GFILE PATHH> <GOPTIONAL PASSWORDH>
-
- Once again, password is optional, but should be specified if any of this
- information is not public.
-
-
-
-
- OUTBOUND HISTORY FILENAME
-
- Outbound history file: GC:\DB\OUTBOUND.TXT H
-
- The OUTBOUND HISTORY FILENAME parameter specifies a text file to write
- an outbound EMAIL history log. Every outbound connection is logged to
- a the specified text file listing the date/time, address, data sent and
- received, elapsed time and total cost. If you do not want such a log,
- leave this field blank.
-
-
-
-
- INBOUND HISTORY FILENAME
-
- Inbound history file: GC:\DB\INBOUND.TXT H
-
- The INBOUND HISTORY FILENAME parameter specifies a text file to write
- an inbound EMAIL history log. Every outbound connection is logged to
- the specified text file listing the date/time, address, data sent and
- received and elapsed time. If you do not want such a log, leave this
- field blank.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.02 DIRECTORY PATHS
- 33
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL HISTORY FILENAME
-
- ECHOmail history file: GC:\DB\ECHOMAIL.TXT H
-
- The ECHOMAIL HISTORY FILENAME specifies what text file to use for the
- inbound ECHOmail history. This log lists date/time, address, area name,
- messages and duplicates received.
-
-
-
-
- AREAFIX HISTORY FILENAME
-
- AREAFIX history file: GC:\DB\AREAFIX.TXT H
-
- The AREAFIX HISTORY FILENAME specifies what text file to use for an
- AREAFIX history log. This includes information about conferences added
- and removed either by remote AREAFIX request or New ECHOmail link, ALT-N.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 34
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.03 COMM / MODEM SETUP
-
-
- The GCOMM/MODEM SETUPH screen allows you to define your serial port(s) and
- modem(s) as well as control such things as:
-
-
- - Answering method
- - Line assignment
- - CostGuard limits
- - DimeSaver
- - Auto-initialization time
- - Dialing overrides
- - Printer setup
- - Inbound, outbound, ECHOmail and AREAFIX history
-
-
- Before D'Bridge can function as an EMAIL system, it must be able to control
- the serial port and modem. This screen allows the definition of modem and
- printer types: MCF and PCF files (Modem Control and Printer Control Files.)
-
-
-
-
-
-
-
-
-
-
-
-
-
- PORT
-
- Port Base/IRQ Status Ident MCF name Description
- GCOM3H G H G H G H G H G H G H
-
-
- The PORT identifies the name of the serial I/O channel connected to your
- modem. Standard values are GCOM1H-GCOM7H, but any other name is allowed
- also. If you select one of the standard ports, the GBASE ADDRESSH an GIRQH
- values will be calculated automatically.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 35
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- BASE ADDRESS
-
- Port Base/IRQ Status Ident MCF name Description
- G H G03E8H G H G H G H G H G H
-
- The BASE ADDRESS determines the CPU's I/O port address to use. If you do
- not understand what this means, you should use a standard port, like GCOM1H
- or GCOM2H. If you do have a non-standard configuration, consult your vendor
- for this information. This field must contain a 16-bit hexadecimal value.
- Standard values are listed below.
-
- IBM PC/XT/AT IBM PS/2
- /------+--------\ /------+--------+------+--------\
- | GCOM1H | 03F8 | | GCOM1H | 03F8 | GCOM5H | 4220 |
- | GCOM2H | 02F8 | | GCOM2H | 02F8 | GCOM6H | 4228 |
- | GCOM3H | 03E8 | | GCOM3H | 3220 | GCOM7H | 5220 |
- | GCOM4H | 02E8 | | GCOM4H | 3228 | GCOM8H | 5228 |
- \------+--------/ \------+--------+------+--------/
-
-
-
-
- IRQ
-
- Port Base/IRQ Status Ident MCF name Description
- G H G H G4H G H G H G H G H
-
-
- The IRQ (Interrupt ReQuest) level determines the hardware-specific interrupt
- vector that will be used. (G3H and G4H are most common) This field must con-
- tain a 4-bit decimal value from 0 to 15. Standard values are listed below.
-
- IBM PC/XT/AT IBM PS/2
- /------+-----\ /------+-----+------+-----\
- | GCOM1H | 4 | | GCOM1H | 4 | GCOM5H | 3 |
- | GCOM2H | 3 | | GCOM2H | 3 | GCOM6H | 3 |
- | GCOM3H | 4 | | GCOM3H | 3 | GCOM7H | 3 |
- | GCOM4H | 3 | | GCOM4H | 3 | GCOM8H | 3 |
- \------+-----/ \------+-----+------+-----/
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 36
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- MCF NAME
-
- Port Base/IRQ Status Ident MCF name Description
- G H G H G H G H G H GUSRC1438H GUS Robotics HST 14400 H
-
- The MCF NAME specifies the name of a D'Bridge "Modem Control File."
- Included, you will find an ZIP file which contains our standard
- MCF collection. If you press GF10H, you will receive a list of all
- modems currently supported. Simply select the Modem Control File
- to use for the specified serial port. When you select a different
- MCF or specify one for the first time, D'Bridge will unZIP the file
- if needed from GMCFILES.ZIPH. A list of files, modems and ident (ATI)
- codes are displayed from the list in GMCFILES.LSTH.
-
- MCF files are simple control files that may be changed using any standard
- text editor. The following control language is used. Keywords are not
- case-sensitive, but must start in column 1 or they will be ignored. Invalid
- syntax is ignored without error to allow backward / forward compatibility.
-
-
- MCF <GNAMEH> <GDESCRIPTIONH>
-
- ie. MCF USRC1419 US Robotics HST 14400
-
- <GNAMEH> must match the DOS filename (without the extension.)
- <GDESCRIPTIONH> is the displayed modem type.
- GMCFH This must always be the first line of a Modem Control File.
-
-
- BAUD <GBAUD RATEH>
-
- ie. BAUD 19200
-
- <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.
-
-
- LOCKED
-
- ie. LOCKED (no parameters)
-
- This causes D'Bridge to always use the specified baud rate, regardless
- of the "GCONNECTH" results reported by the modem. If you are using this
- mode, the modem must also be configured to use a fixed DTE rate. &B1 is
- used on HST's, for example.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 37
- --------------------------------------------------------------------------------G
-
-
-
-
- DELAY <GMILLISECONDSH>
-
- ie. DELAY 50
-
- This specifies the inter-character delay in milliseconds when sending
- commands to the modem. The default is G20H, but some modems may require
- values as high as G50H or G60H.
-
-
- TIMEOUT <GSECONDSH>
-
- ie. TIMEOUT 75
-
- This specifies the failsafe timeout when dialing or answering the phone.
- This defaults to G60H, but might need to be increased if overseas calls
- take longer than one minute to complete.
-
-
- DIAL <GBAUD RATEH> <GMODEM STRINGH>
-
- ie. DIAL 19200 ATDT
-
- <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 19200 or 38400.
- <GMODEM STRINGH> is the command sent to the modem before the phone number.
-
-
- ANSWER <GMODEM STRINGH>
-
- ie. ANSWER ATA
-
- <GMODEM STRINGH> is the command sent to the modem to answer the phone.
-
-
- INIT <GMODEM STRINGH>
-
- ie. INIT ATZ
-
- <GMODEM STRINGH> is a command to configure the modem as desired.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 38
- --------------------------------------------------------------------------------G
-
-
-
-
-
- TRANSLATE <GBAUD RATEH> <GRESPONSEH>|<G*C STRINGH>
-
- ie. TRANSLATE 2400 CONNECT 2400/ARQ|2400MNP
-
- <GBAUD RATEH> is 300, 1200, 2400, 4800, 9600, 14400, 19200 or 38400.
- <GRESPONSEH> is the connection result string from the modem.
- <G*C STRINGH> is the translated response code for the BBS "*C" code.
-
-
- PREINIT <GMODEM STRINGH>
-
- ie. PREINIT AT&C1&D2&W
-
- <GMODEM STRINGH> is a command to pre-configure the modem as desired.
-
-
-
-
- ANSWERING METHOD
-
- Answering method: GHardware H (GHHardware/GSHoftware/GMHodem/GRHingmaster/GDHisable)
-
- This specifies the method D'Bridge will use to answer incoming calls.
-
- /------------+---------------------------------------------------------------\
- | GHARDWAREH | Answers using hardware ring detection. (RS-232 pin 22) |
- | | |
- | GSOFTWAREH | Answers using software ring detection. (RING from modem |
- | | |
- | GMODEMH | Assumes that modem will auto-answer. (S0=1 assumed) |
- | | |
- | GRINGMASTERH | Hardware ring detection with multi-pattern ring detection. |
- | | 3 different ring patterns are detected, see GLINE ASSIGNMENTH. |
- | | |
- | GDISABLEH | Answering completely disabled. |
- \------------+---------------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 39
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- LINE ASSIGNMENT
-
- Line assignment: GV11H (G1H/G2H/G3H/GVHoice)
-
- When using the RingMaster answering method, it is necessary to assign
- the three possible ring patterns to the desired DATA lines. G1H, G2H and G3H
- correspond to the GDATA/1H, G2H and G3H. GVoiceH designates a ring pattern
- to be ignored by D'Bridge and logged as a voice call.
-
- * NOTE * It is recommended to use the first ring pattern as voice.
-
-
-
-
- COSTGUARD TIME
-
- CostGuard limits: G240H (minutes) G H (cost)
-
- The COSTGUARD TIME specifies the absolute maximum amount of time an
- EMAIL session may last. When the elapsed time for any inbound or
- outbound call reaches the number of minutes specified, DTR is lowered
- and the call is aborted by D'Bridge.
-
-
-
-
- COSTGUARD COST
-
- CostGuard limits: G H (minutes) G100.00 H (cost)
-
- The COSTGUARD COST specifies the absolute maximum cost of an outbound
- EMAIL session. When the accumulated cost for any outbound call reaches
- the amount specified, DTR is lowered and the call is aborted by D'Bridge.
-
-
-
-
- COLLISION DETECTION
-
- Collision detection? GYesH
-
- This specifies whether or not D'Bridge will detect collision of outbound
- dialing attempts with inbound calls. This is usually desirable, but it
- is possible that it will not work well with every kind of modem, so you
- should disable it if it incorrectly detects collisions.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 40
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DIMESAVER ENABLED
-
- DimeSaver enabled? GYesH (GYHes/GNHo)
-
- This specifies whether or not the DimeSaver feature should be used.
- DimeSaver causes D'Bridge to answer a potential inbound call if the
- modem reports GNO DIAL TONEH when placing an outbound call. If there
- was no incoming call, subsequent DimeSaver activations will not occur.
-
-
-
-
- AUTO INITIALIZATION
-
- Auto-Initialization: G5 H (minutes)
-
- This parameter specifies the number of minutes idle before automatically
- re-initializing the modem. Sometimes, modems go "out-to-lunch" because
- of brown-outs, cats and so forth. Re-programming the modem every few
- minutes certainly can't hurt and sometimes solves problems of unattended
- operation.
-
- If you specify zero, this feature will be disabled and the modem will
- only be initialized after each call and upon startup.
-
-
-
-
- BUSY WHEN OFFLINE
-
- Busy when offline? GNo H (GYHes/GNHo)
-
- D'Bridge does many things. During the time calls may not be answered,
- the phone can either be busy or just keep ringing. If you answer GYesH
- to this question, the phone will be taken off hook whenever D'Bridge is
- not ready to accept a call.
-
- - If you are using a dedicated data line, GYesH is preferred.
-
- - If you are using a voice/data line, in most cases, use GNoH.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 41
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TOUCH TONE DIALING
-
- Touch-Tone dialing? GYesH (GYHes/GNHo)
-
- If you have a Touch-Tone<tm> telephone line, answer GYesH to this question.
- Pulse (rotary) dialing will be used if you specify GNoH.
-
-
-
-
- MAXIMUM RINGS
-
- Maximum rings: G4 H
-
- Some modems will report RINGING when placing an outbound call. This
- allows D'Bridge to count the number of times the remote phone rings.
- If this count exceeds the maximum specified by this parameter, dialing
- will be aborted.
-
- If the maximum ring count is exceeded on two consecutive attempts at
- calling the same system, the call will be placed on Ten minute hold.
- Unless overridden by GVIEW/MODIFY QUEUEH, no further attempts will be
- made for at least ten minutes.
-
-
-
-
- FLAG DIAL
-
- "Flag" dial: GHST ATB1DT H
-
- This field is only used to define the exceptions to the normal dialing
- commands. The flag specifies a substring to match in the GnodelistH
- GflagsH field. When D'Bridge places an outbound call, it searches the
- nodelist flags fields for a match in the "Flag" dial list. The first
- match found will determine the <GDIAL STRINGH> to use. The format is:
-
- <GNODELIST FLAGH> <GDIAL STRINGH>
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 42
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SPECIFIC DIAL
-
- Specific dial: G2:280/280 ATX0M1DT H
-
- This field lists exceptions to the normal and "Flag" dialing commands.
- After D'Bridge searches the "Flag" dial list, it looks for the first
- match in Specific dial. If you are using an address such as G2:ALLH,
- make sure any specific systems are listed before the wildcard entry.
- The format is:
-
- <GADDRESS MASKH> <GDIAL STRINGH>
-
- ie. 2:280/280 should come before 2:280/ALL, etc.
-
-
-
-
- PRINTER PORT
-
- Printer port: GPRN H
-
- Define the printer device here. If you wish to route output to a file for
- later printing, you may specify the filename here.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.03 COMM / MODEM SETUP
- 43
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PCF NAME
-
- PCF name: GOKIOL400 H GOKIDATA OL400 LED page printerH
-
- The PCF NAME specifies the name of a D'Bridge "Printer Control File."
- Included, you will find an ZIP file which contains our standard
- PCF collection. If you press GF10H, you will receive a list of all
- printers currently supported. Simply select the Printer Control File
- to use for the printer port. When you select a different PCF or specify
- one for the first time, D'Bridge will unZIP the file if needed from
- GPCFILES.ZIPH. A list of printers supported is displayed from the list
- in GPCFILES.LSTH.
-
- PCF files are simple control files that may be changed using any standard
- text editor. The following control language is used. Keywords are not
- case-sensitive, but must start in column 1 or they will be ignored. Invalid
- syntax is ignored without error to allow backward / forward compatibility.
-
-
- PCF <GNAMEH> <GDESCRIPTIONH>
-
- ie. PCF OKIOL400 OKIDATA OL400 LED page printer
-
- <GNAMEH> must match the DOS filename (without the extension.)
-
-
- FIXED FONT <GPRINTER CODESH>
- PROPORTIONAL FONT <GPRINTER CODESH>
- TITLE FONT <GPRINTER CODESH>
- START BOLD <GPRINTER CODESH>
- END_BOLD <GPRINTER CODESH>
- START_ITALIC <GPRINTER CODESH>
- END_ITALIC <GPRINTER CODESH>
- GRAPHICS <ON or OFF>
-
- ie. FIXED FONT <ESC>&l0O<ESC>(10U<ESC>(s0p10h12v0s0b3T
- PROPORTIONAL FONT <ESC>&l0O<ESC>(0U<ESC>(s1p10v0s0b5T
- TITLE FONT <ESC>&l0O<ESC>(0U<ESC>(s1p14.4v0s3b4T
- START BOLD <ESC>(s7B
- END BOLD <ESC>(s0B
- START ITALIC <ESC>(s1S
- END ITALIC <ESC>(s0S
- GRAPHICS ON
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 44
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.04 SCHEDULE MAINTENANCE
-
-
- The GSCHEDULE MAINTENANCEH screen allows you to program the weekly event
- schedule as well as set up routing, and access rules. Parameters include:
-
- - Schedule day/time
- - Time between caalls
- - Maximum tries, sessions and failures
- - Priorities allowed
- - Polling
- - Routing
- - Forwarding
- - Many more...
-
-
-
-
-
- EVENT TAG
-
- Event "tag": GNMH H
-
- The "TAG" is an arbitrary 8-letter name by which you identify the event.
- In the above example, I've used "NMH" to stand for "National Mail Hour."
- This "TAG" must be unique; it is used on the screen and in the log to
- identify events.
-
-
-
-
- EVENT ENABLED
-
- Enabled? GYesH
-
- This Yes/No question simply specifies whether this event should be
- currently enabled or not. Normally, you would answer YES but if you
- ever want to temporarily disable the event, you may change it to NO.
- This option is provided so you may disable events without actually
- removing them.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 45
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EVENT TYPE
-
- Type: GMail H (GMHail/GDHOS/GEHxit/GCHlockSync)
-
- There are four types of events; each functions differently:
-
- GMailH
-
- A "mail" event defines a period of time when certain mail
- may be sent. The default is to send ALL mail, unless you
- specify ADVANCED ROUTING.
-
- GDOSH
-
- A "DOS" event defines a list of DOS commands, programs and
- batch files to execute at a pre-defined time. These tasks
- are all "spawned" while D'Bridge remains in memory. This
- will only work if you have enough memory.
-
- GExitH
-
- An "exit" event specifies that you want D'Bridge to terminate
- at the specified time. This would normally be used in a
- batch file to transfer control to another program - instead
- of "spawning" it as above. With EXIT, you specify which DOS
- errorlevel you want to use.
-
- GClockSyncH
-
- A ClockSync event will set the system clock using the atomic
- clock or another D'Bridge system. The accuracy should be within
- a tenth of a second (plus the propagation delay) of the Timebase
- system.
-
-
-
-
- EVENT DAYS
-
- Weekday(s): [ ]All [GXH]Sun [ ]Mon [ ]Tue [GXH]Wed [ ]Thu [ ]Fri [GXH]Sat
-
- With the EVENT DAYS field, you put an "GXH" next to all days that you wish
- to run this event. If you specify GALLH, then all the days of the week
- are marked. To access individual days, erase the "X" next to GALLH by
- pressing the GSPACE BARH.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 46
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EVENT START
-
- Start time: G14:30H
-
- Specify the time you wish to activate the event. This time should be
- specified in 24-hour format and must not conflict with any other
- scheduled event. To specify a START TIME, just enter a time using 3 or
- 4 digits. For example:
-
- 300 is 3:00 AM; 2250 is 10:50 PM
-
-
-
-
- EVENT END
-
- End time: G15:20H
-
- Specify the time you wish a mail event to end. This time should be
- specified in 24-hour format and must not conflict with any other
- scheduled event. To specify an END TIME, just enter a time using 3 or
- 4 digits. For example:
-
- 300 is 3:00 AM; 2250 is 10:50 PM
-
-
-
-
- EVENT ERRORLEVEL
-
- Errorlevel: G200H
-
- For GEXITH EVENTS, you simply specify the DOS ERRORLEVEL to return when
- terminating. This number would normally be used by an "IF ERRORLEVEL"
- directive in a batch file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 47
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EVENT DOS COMMANDS
-
- DOS commands: GMAILCHEK -S H
-
- For GDOSH events, you may specify any number of DOS commands, programs
- or batch files to execute. It is even possible to use DOS primitives
- like CD (change directory) and COPY. It is up to you to make sure none
- of the commands specified require human interaction. For example, if
- you specify the command to start your word processor, odds are the word
- processor will continue running until someone comes along...
-
-
-
-
- BETWEEN CALLS
-
- Between calls: G15 H to G45 H (seconds)
-
- Here, you specify the period of time to wait between outbound calls.
- This is entered as a "range." If you say "30 to 60," then D'Bridge
- will wait a random amount of time between 30 and 60 seconds before
- placing a subsequent call. This period of time is used to receive
- incoming mail; if this event is supposed to send mail only, you may
- specify a very short time period.
-
-
-
-
- EVENT CRITICAL
-
- Critical? GYesH (GYHes/GNHo)
-
- For GDOSH and GEXITH EVENTS, you should specify "GYESH" if you want the event
- to execute even if D'Bridge is not running at the time of the event. A
- CRITICAL event is one that D'Bridge will execute even after the START
- TIME specified; it is only executed once. Specify "GNOH" if you want the
- event to occur ONLY if D'Bridge is running at that time.
-
-
-
-
- MAX DIALING TRIES
-
- Max tries: G30 H
-
- The MAX TRIES parameter indicates the maximum number of times D'Bridge
- should attempt to dial a specific system during the current GMAILH EVENT.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 48
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- MAX SESSIONS
-
- Max sessions: G3 H
-
- The MAX SESSIONS parameter specifies the maximum number of actual
- connects allowed during the given mail event. This is handy for
- limiting ECHOmail turnaround to long-distance systems.
-
-
-
-
- MAX SESSION FAILURES
-
- Max failures: G2 H
-
- The MAX FAILURES parameter specifies the maximum number of aborted or
- bad sessions allowed with each system during the specified mail event.
- This parameter may help control costs when the answering system has
- crashed or is not functioning properly.
-
-
-
-
- EVENT CLOCKSYNC TIMEBASE
-
- TimeBase: G1:3601/14 H
-
- For GClockSyncH events, this field designates the TimeBase to use for
- setting the system clock. Either specify the EMAIL address of another
- D'Bridge system, or leave the field blank to use the Atomic Clock.
-
- * Note * If the clock is wrong on the D'Bridge system specified,
- your clock will also be set to an incorrect time. Make sure you use
- a trust-worthy system.
-
-
-
-
- ACCEPT EMAIL CALLS
-
- Accept EMAIL calls? GYesH (GYHes/GNHo)
-
- This specifies whether or not D'Bridge should answer the phone to accept
- EMAIL/BBS calls during this event. If you answer GNoH, the phone will
- not be answered and will remain on-hook for the duration of the event.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 49
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PRIORITIES ALLOWED
-
- Priorities allowed? GNCIH (GNH/GCH/GIH)
-
- This field specifies what mail priorities (if any) may be sent during
- this event. For most events, specify GNCIH (Normal, Crash and Immediate),
- as allowable priorities. Keep in mind that outbound calls are still con-
- trolled by the cost-accounting system.
-
- This field simply serves as a master override to cost-accounting.
-
-
-
-
- HOST ROUTE PRIVATES
-
- Host-route privates? GNo H (GYHes/GNHo)
-
- If you want NETmail messages destined for private or unlisted systems
- to be host-routed, answer GYesH to this question. If you answer GNoH,
- the mail will be held, waiting for the remote system to poll to pick
- it up.
-
- * Note * Host-routed mail may not be picked-up by the destination.
-
-
-
-
- CM SYSTEMS ONLY
-
- CM/Non-CM systems only? GBoth H (GCHM/GNHon-CM/GBHoth)
-
- "CM" stands for Continuous Mail, a system designated as being able
- to receive EMAIL calls anytime. Certain events might be designated
- to send mail only to CM systems just as other scheduled events might
- be reserved for sending mail only to NON-CM systems. Specify GBothH
- if you want to send all mail regardless of the CM nodelist flag.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 50
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EVENT SCAN ECHOMAIL
-
- Scan ECHOmail areas? GYesH (GYHes/GNHo)
-
- If you want D'Bridge to scan all ECHOmail areas for new outbound
- traffic each time this event begins, answer GYesH here. Only when
- the event starts for the first time each day will the ECHOmail scan
- be performed.
-
-
-
-
- EVENT DYNAMIC
-
- Dynamic event? GNo H (GYHes/GNHo)
-
- If you answer GYesH to this question, a mail event will terminate when
- there are no more outbound calls to make. When a dynamic event ends
- early, the UN-EVENT is resumed and the queue is rebuilt.
-
-
-
-
- ALLOW REQUESTS
-
- Process requests? GYesH (GYHes/GNHo)
-
- If you want to allow file-requests during this event, answer GYesH to
- this question. Otherwise, file-requests (FREQs) will be rejected.
-
-
-
-
- ACCEPT HUMAN CALLS
-
- Accept human calls? GYesH (GYHes/GNHo)
-
- If you want to allow human (BBS) calls during this event, answer GYesH to
- this question. If you answer GNoH, human calls will be rejected for the
- duration of the event and callers will be notified that the system is cur-
- rently accepting EMAIL calls only.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 51
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EVENT ALLOW XMAIL
-
- Allow XMAIL? GYesH (GYHes/GNHo)
-
- If you want to allow XMAIL (compressed mail) traffic to be sent
- during this event, answer GYesH to this question. If you answer
- GNoH, all XMAIL will be held, disallowing pickup by remote systems.
-
- Specify GNoH only for dedicated NETmail events. In most cases, GYesH
- is the appropriate answer.
-
-
-
-
- PACKETS FOR
-
- Packets for: GALL H
-
- Here's where we get into the filters and addresses! In PACKETS FOR,
- specify a filter as defined previously in this section. This will
- determine for which systems you want to create packets.
-
- * Note * This does not necessarily mean D'Bridge will call the
- system, since the packet might be on "HOLD" or "ROUTED" to a diffe-
- rent system.
-
-
-
-
- HOLD FOR
-
- Hold for: GNONE H
-
- If you wish to hold all outbound traffic for certain systems, specify
- them here with a filter. With a system on "hold", no calls will be
- made to it during this event, regardless of priority.
-
-
-
-
- EVENT POLL
-
- Poll: G1:110/68 H
-
- If you wish to poll certain systems each time this event is started, list
- the EMAIL addresses here. Polling means: to call a system in order to
- pick up any mail that is "on hold."
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 52
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PICKUP FROM
-
- Pickup from: GALL H
-
- Normally, D'Bridge will pick up mail from GALLH systems it calls.
- However, if you wish, you may specify a filter to control from which
- systems you would like to receive "hold" mail from when you call to
- deliver outbound traffic.
-
-
-
-
- ALLOW PICKUP FROM
-
- Allow pickup from: GALL H
-
- Normally, D'Bridge will allow GALLH systems to pick up their "hold" mail
- when they poll or call to deliver mail. If you want to run a completely
- secure system, you might not want to allow pickup for certain systems.
- Since D'Bridge has password-security, it would be rare to use anything
- other than GALLH here.
-
-
-
-
- ROUTE TO
-
- Route to: GNONE H
-
- Normally, D'Bridge sends mail directly to the receiving system when you
- write EMAIL messages. "Routing" is a way to cut costs by sending mail
- through other EMAIL systems or networks to be delivered to its final
- destination.
-
- "Route to" may control specific routing and/or host-routing. This field
- may contain multiple lines, so the last line should contain GHOSTSH or
- host/hub-routing or GNONEH for direct delivery.
-
- Specific routing may be done by specifying:
-
- Route to: <GADDRESSH> FOR <GFILTERH>
-
- ie.
- Route to: 110/68 for 110/ALL 2:ALL 3:ALL
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 53
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ROUTE FILES FOR
-
- Route files for: GNONE H
-
- D'Bridge has the capability of routing attached data files along with
- EMAIL messages. This should be used only by special arrangement between
- the system operators involved.
-
- Specify the filter describing the systems willing to route in-transit
- files from your system. This is only applicable if you are using a rou-
- ting other than GNONEH.
-
-
-
-
- FORWARD FOR
-
- Forward for: GALL H
-
- D'Bridge will forward in-transit mail for the systems specified in this
- filter. In most cases, GALLH should be specified.
-
-
-
-
- FORWARD TO
-
- Forward to: GOURNET H
-
- D'Bridge will forward in-transit mail to the systems specified in this
- filter. Using GOURNETH means D'Bridge will only forward in-transit mail
- destined for systems with the same NET number as your own. (It is assumed
- there is no cost associated with calls within your NET.)
-
-
-
-
- FORWARD FILES FOR
-
- Forward files for: GALL H
-
- D'Bridge will forward in-transit files for the systems specified in this
- filter. In most cases, GALLH should be specified.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.04 SCHEDULE MAINTENANCE
- 54
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FORWARD FILES TO
-
- Forward files to: GOURNET H
-
- D'Bridge will forward in-transit files to the systems specified in this
- filter. Using GOURNETH means D'Bridge will only forward in-transit mail
- destined for systems with the same NET number as your own.
-
-
-
-
- MAIL RECEIVED DOS COMMANDS
-
- DOS commands: G H
-
- During certain events, you may wish to have D'Bridge terminate or
- execute DOS commands every time mail is received from a remote system.
- The DOS COMMANDS field allows you to specify any number of DOS commands
- or programs to be executed when mail arrives. Any DOS command or
- program may be used, but you must make sure they don't require any human
- interaction or D'Bridge will be "stuck" until you give the program the
- input it wants.
-
- As well as DOS commands, the following functions are available from
- the DOS COMMANDS field:
- /----------------+-----------------------------------------------------------\
- | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory |
- | | available to the application program. |
- | | |
- | G-H(command) | Causes the command to be executed inside the queue |
- | | window. Only use this for programs that do standard |
- | | DOS I/O. |
- | | |
- | G*RH | This will force a rescan of the queue. Same as ALT-Q |
- | | |
- | G*SH | This will force a complete ECHOmail rescan. |
- | | |
- | G*X<errorlevel>H | This causes an exit with the specified DOS errorlevel. |
- \----------------+-----------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 55
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.05 NODELIST CONFIGURATION
-
-
- The GNODELIST CONFIGURATIONH screen allows you to setup the nodelist database
- that D'Bridge uses to make outbound calls. Parameters include:
-
- - St. Louis nodelists
- - Private nodelists
- - Pointlist
- - Zonegate data
- - Exclude/Translate NETs
- - Prefixes
- - Baud, Flag and Phone overrides
-
-
-
-
- ST LOUIS NODELISTS
-
- "St. Louis" nodelists? GC:\DB\FILES\ DBNET DBDIFF H
-
- "St. Louis" refers to a standard format for NODELIST text files. This
- includes a "nodelist" and a "nodediff". You may have any number of
- St. Louis-style nodelists at one time by listing each separately in
- the window. Each line in the window describes one nodelist and should
- contain:
-
- <GDIRECTORY PATHH> <GNODELIST BASEH> <GNODEDIFF BASEH>
-
- For example:
-
- C:\DB\FILES\ NODELIST NODEDIFF 7567 153
- C:\DB\FILES\ ANETLIST ANETDIFF 38791 153
-
- The two numbers on the right are the CRC of the nodelist name and the
- currently installed nodelist. These numbers are maintained by D'Bridge
- and the user need not concern himself with them.
-
- D'Bridge automatically determines which nodelist is the most-recent based
- on the extension of the "list" or "diff" file. The St. Louis format is
- based on weekly update files called "diff" files; these files contain
- the differences between last week's and this week's nodelists and are
- generally smaller than the nodelist itself. If a diff file exists for
- a nodelist, it will be automatically decompressed and installed when
- it arrives (if applicable).
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 56
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PRIVATE NODELISTS
-
- Private nodelist(s): GMYLIST.PVT H
-
- You may also use any number of private nodelists. In this field you
- may specify any number of text files to be included in your compiled
- nodelist. You may notice D'Bridge adds two numbers after the filename
- once the nodelist is compiled; these numbers are the date and time of
- the private nodelist file. If these numbers are changed or the node-
- list is replaced or edited, D'Bridge will automatically recompile the
- nodelist when it is started next.
-
-
-
-
- POINTLIST
-
- Pointlist: GPOINTS.LST H
-
- If you are part of a point system, you will want to specify the name of
- your POINTLIST file.
- This is a list of POINTS under the same ZONE:NET/NODE as your system.
- Just like the PRIVATE NODELISTS, the numbers after the filename indicate
- the date and time of the POINTLIST when the nodelist was last compiled.
- If these are changed, D'Bridge will automatically recompile the nodelist.
-
-
-
-
- FAKE POINTNET
-
- Fake pointnet: G32001H
-
- To maintain compatibility with older EMAIL systems, a "FAKE POINTNET"
- has been established to allow Fidonet-based mailers to act as points
- of a D'Bridge BOSS. Since there is no definition of a "point" address
- in Fidonet, a fake NET number is used. Specify the fake net to use
- here. When a system calls in using that NET number, the node number
- used will be translated to a point address.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 57
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FAKE POINTS
-
- Fake points: G1 2 4 22 H
-
- This field specifies which systems require the FAKE POINT addressing.
- Specify the point numbers of the systems for which FAKE POINT addressing
- is required. This affects the way in which ECHOmail packets are created.
- This is never required with points running D'Bridge EMAIL System; it is
- provided for compatibility with older Fidonet-based systems.
-
-
-
-
- USERNAME INDEX
-
- Create username index? GYesH
-
- D'Bridge will optionally create a USERNAME index when it compiles the
- nodelist. If you answer "YES" to this field, the index will be created
- and D'Bridge (and the editor) will be able to cross-reference operator
- name to address. This feature is quite handy, but makes the nodelist
- compile much slower. If you don't want the index created, answer "NO."
-
-
-
-
- USERLIST FILE
-
- Additional user file: GUSER.LST H
-
- You may specify the name of a text file containing an additional user-
- list to merge with the nodelists. Typically, this file will contain a
- list of people who use certain EMAIL systems but are not listed as
- the primary operator. The format for this file is:
-
- <GADDRESSH> <GUSER NAMEH>
-
- ie. 1:135/68.2 George Meyers
- .20 John Smith
- 107/27.5 Oliver South
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 58
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- OUTBOUND GATEWAY
-
- Outbound gateway: G1:110/68 H
-
- Most networks do not use an outbound gateway, but if your NET has a
- system designated to send all outbound mail, then put its address here.
- You would use this in conjunction with the ROUTE TO field in the schedule
- maintenance subsystem. (ROUTE TO: OGATE FOR OTHERS)
-
-
-
-
- USE ZONEGATES
-
- Use zonegates? GNo H
-
- Fidonet (as well as other international networks) maintain so called
- ZONEGATES that allow mail to be sent from one ZONE to another without
- placing an overseas call. If you are part of Fidonet, and you are sen-
- ding mail from the U.S. to Europe, you have the option of sending the
- mail through the ZONE 1 gateway (1/2) or going direct to your destination.
- Specify "YES" if you wish all interzone traffic (without attached files)
- to be routed through the ZONEGATE; specify "NO" if you always want to use
- direct routing.
-
-
-
-
- EXCLUDE NETS
-
- Exclude ZONE:NET(s): G2:ALL 3:ALL H
-
- Some systems (that use a large NODELIST like Fidonet) may want to
- completely eliminate certain ZONES and/or NETS from their nodelist.
- If there is no reason to communicate with people in other countries,
- you can greatly reduce the NODELIST size and compile-time by excluding
- those addresses you don't use. For example, if you live in the U.S.
- and don't plan to do any mail to Europe or Australia, you may exclude
- these continents completely by using the statement from the example
- above.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 59
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TRANSLATE NETS
-
- Translate NET(s): G H
-
- This field gives you the option to actually translate one NET to
- another. This will let you move a NET from one zone to another or
- simply change the NET number to something else. This will not be
- used for most systems, but is a feature found in other EMAIL systems
- and I am including it for compatibility. The syntax is:
-
- <Goriginal ZONE:NETH> <Gnew ZONE:NETH>
-
-
-
-
- COUNTRY CODE
-
- Country code: G1 H
-
- Here, you MUST specify your country code. This is the prefix found
- before the "area code" in the nodelist. For the U.S. and Canada,
- specify "1" - other countries, specify your country code (in the same
- way you do with DOS)
-
-
-
-
- LOCAL PREFIX
-
- Local prefix: G H
-
- If there is a prefix you must dial before NO-COST (local) calls, speci-
- fy it here. In the U.S. and Canada, this field will be left blank in
- most cases. (Some PBX systems might require you to dial "9" to get a
- local outside line.)
-
-
-
-
- DOMESTIC PREFIX
-
- Domestic prefix: G H
-
- If there is a prefix in your country that you must dial before all
- domestic calls, specify it here. For the U.S. and Canada, this field
- should be left blank; we need no PREFIX. (Some PBX systems might
- require you to dial an "8" to get a long-distance line.)
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 60
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- INTERNATIONAL PREFIX
-
- International prefix: G011 H
-
- Specify the prefix to dial before any international calls are made.
- In the U.S., use "011" - other countries, check with your phone company.
- An international call is defined as one where the COUNTRY PREFIX of the
- system being called differs from your own.
-
-
-
-
- PHONE NUMBER OVERRIDES
-
- Phone number overrides: G110/68 1-513-424-5167 H
-
- If you wish to override the phone number for an existing address, or
- define the phone number for an unlisted NODE or POINT, the PHONE NUMBER
- OVERRIDES field is the place to do this.
-
- <GADDRESSH> <GPHONE NUMBERH> <GACCOUNTING/CONTROL PREFIXH>
-
-
-
-
- BAUD RATE OVERRIDES
-
- Baud rate overrides: G110/68 9600 H
-
- This is where you may specify temporary overrides to the baud rate for
- specified addresses.
-
- <GADDRESSH> <GBAUD RATEH>
-
- * NOTE * This does not affect modems with a locked baud rate.
-
-
-
-
- FLAG OVERRIDES
-
- Flag overrides: G110/68 CM,XX,HST H
-
- This is where you may specify temporary overrides to the nodelist flags
- for specified addresses.
-
- <GADDRESSH> <GFLAGSH>
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.05 NODELIST CONFIGURATION
- 61
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SYNONYMS
-
- Synonyms: GARTHUR 1:3601/14 H
-
- This field defines a list of synonyms that will substitute a KEYWORD
- for an EMAIL ADDRESS. These mnemonic keywords allow for quick and easy
- entry of commonly used systems.
-
- <GKEYWORDH> <GADDRESSH>
-
-
-
-
- AUTO COMPILE NODELIST
-
- Auto-compile nodelists: G H (GSHtartup/GMHidnight/GNHever)
-
- Before a nodelist can be used, it must be compiled and indexed in the
- nodelist database files. This process can take anywhere from 5 seconds
- to 45 minutes, depending on the speed of your computer. Three options
- are available to specify when to test the nodelist for currency:
-
- /----------+---------------------------------------------------------------\
- | GSTARTUPH | Tests and/or rebuilds the database every time D'Bridge is |
- | | fired up. (This includes the nightly auto-restart.) |
- | | |
- | GMIDNIGHTH | Tests and/or rebuilds the database after the auto-restart |
- | | routine. |
- | | |
- | GNEVERH | Only rebuilds the database upon request or if it is missing. |
- \----------+---------------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 62
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.06 PACKET MAIL CONTROL
-
-
- The GPACKET/MAIL CONTROLH screen allows you to set up general mailer controls.
- Parameters include:
-
- - Outbound/Inbound mail archives
- - NETmail purge criteria
- - Renaming of duplicate files
- - Pre-unpack command
- - ECHOmail controls
- - AREAFIX controls
-
-
-
-
-
- OUTBOUND MAIL ARCHIVE
-
- Outbound mail archive: GC:\DB\OLDMAIL\OUTBOUND.TXT H
-
- This specifies the name of the text file (if any) to write messages
- flagged ARCHIVE/SENT to before they are erased. This is quite useful
- as a history of NETmail; it includes the full message text and the
- date and time it was sent.
-
-
-
-
- INBOUND MAIL ARCHIVE
-
- Inbound mail archive: GC:\DB\OLDMAIL\INBOUND.TXT H
-
- The INBOUND MAIL ARCHIVE parameter specifies the text file (if any) into
- which the DBUTIL PURGE option will archive NETmail messages before era-
- sing them. If you do not wish to save old NETmail messages, leave this
- field blank.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 63
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NETMAIL PURGE CRITERIA
-
- Purge NETmail after: G30 H days
-
- -or-
-
- Purge NETmail except: G100 H messages
-
- In the DBUTIL PURGE program, there are two options for deciding which
- messages to erase from the system. When the cursor is on this field,
- you may press the F10 key to switch between the methods: PURGE EXCEPT
- and PURGE AFTER. With PURGE EXCEPT, DBUTIL will erase all but "x"
- messages; specify "x" in this field as how many messages to save after
- purging. With the PURGE AFTER option, DBUTIL will purge messages based
- on their age. PURGE AFTER 30 DAYS means to erase all messages over 30
- days old when DBUTIL PURGE is run.
-
-
-
-
- RENAME DUPLICATE FILES
-
- Rename duplicate files? GYesH
-
- There will be occasions when you receive different files with the same
- name. If you answer YES to this question, any files received having a
- duplicate name in the INBOUND FILES DIRECTORY will be renamed by "se-
- quencing" the last character of the extension.
- A duplicate README.TXT would become README.TX1 if it existed; if "1"
- was already there as well, "2" would be used, etc. If you answer NO,
- the existing file will simply be replaced by the one just received.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 64
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- MAIL PROCESSING
-
- Inbound mail handling? GAutomaticH (GAHutomatic/GMHanual/GEHxternal/GDHisabled)
-
- This parameter controls the method used for receiving and processing
- inbound mail traffic. For most cases, GAutomaticH would be the best
- choice because mail is unpacked and possibly forwarded continuously
- allowing immediate access to all ECHOmail and forwarded NETmail for
- the nodes served by your system. The options available are:
-
- /-----------+--------------------------------------------------------------\
- | GAUTOMATICH | Automatically processes mail after each call. Exceptions |
- | | are low disk-space, event override or QuickDial active. |
- | | |
- | GMANUALH | Processes mail only when activated by the operator. |
- | | |
- | GEXTERNALH | Completely disables internal processing and causes inbound |
- | | XMAIL and EMAIL packets to be received as normal data files. |
- | | |
- | GDISABLEDH | Completely disables processing of inbound mail. |
- \-----------+--------------------------------------------------------------/
-
-
-
-
- PACKET PREPROCESSOR
-
- Pre-unpack command: G H
-
- If you wish to run an external program before processing inbound .PKT
- files, specify a DOS command here. The use for this varies from running
- archival/statistical analyzers to executing a "Message Police" program
- of some type.
-
- WARNING: Modifying packets might upset some people...
-
-
-
-
- KILL NULL MESSAGES
-
- Kill null messages? GYesH (GYHes/GNHo)
-
- Usually, you would answer YES to KILL NULL MESSAGES. A null message
- means a message that has a TO, FROM and SUBJECT, but no text. These
- are usually just messages associated with a file-attach and should
- be ignored anyway. If you answer YES to this question, all messages
- that are unpacked and have no text will be ignored.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 65
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- KILL IN TRANSIT MESSAGES
-
- Kill in-transit messages? GYesH (GYHes/GNHo)
-
- An IN-TRANSIT message is a message which was neither originated from
- nor destined for your system. This message exists on your system just
- to be forwarded elsewhere. If you answer YES to this question, IN-
- TRANSIT messages will be flagged KILL/SENT when they arrive. If you
- answer NO here, forwarded mail will "pile-up" until it is purged or
- manually killed.
-
-
-
-
- IN TRANSIT RESCAN
-
- In-transit rescan? GYesH (GYHes/GNHo)
-
- If your system acts as a hub or boss-node, you might want to provide
- immediate turnaround when "routed" mail is received. If you answer
- YES to IN-TRANSIT RESCAN, the NETmail area will be rescanned after each
- in-transit message is received. This will cause the message to be made
- available to the destination system immediately rather than at the be-
- ginning of the next event.
-
-
-
-
- LIMIT NO COST CALLS
-
- Limit no-cost calls? GNo H (GYHes/GNHo)
-
- D'Bridge has a limit for the number of connections with a given system
- in each mail event. This limit exists to make sure ECHOmail traffic
- only turns-around a few times each mail event. Since local calls are
- usually free, you can circumvent this limit for no-cost calls. Answering
- GYesH here will make unlimited local calls for ECHOmail turnaround.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 66
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SECURED ECHOMAIL ONLY
-
- Secured ECHOmail only? GNo H (GYHes/GNHo)
-
- Some hubs may wish to run a more secure system by only allowing
- ECHOmail from passworded systems. It makes sense that routine
- mail links should be secured for the benefit of the whole network.
- If you answer GYesH to this question, all ECHOmail received from
- non-passworded systems will be tossed into the BADECHO area.
-
-
-
-
- LEAVE SEENBYS
-
- Save ECHOmail SEENBYs? GYesH (GYHes/GNHo)
-
- If you wish to save the text containing the SEEN-BY lines in your
- message base, answer YES. It really doesn't matter how you respond
- to this question; the system will perform the same way.
-
- * NOTE * This field only affects the Quick storage method.
-
-
-
-
- SAVE DUPLICATE MESSAGES
-
- Save duplicate messages? GNo H (GYHes/GNHo)
-
- Personally, I would answer NO to this question, but if you would like
- to see what messages are received more than once, answer YES here. If
- you save the duplicate messages, they will be tossed into the BADECHO
- area for your inspection.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 67
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FORCED PRIORITIES
-
- Forced priorities: G1:110/68 CRASH H
-
- This window allows you to absolutely override the priority for any
- system on a semi-permanent basis. The overrides are listed one per
- line and the format is:
-
- <GADDRESSH> <GIMMEDIATEH/GCRASHH/GHOLDH>
-
- This field is also maintained in the VIEW/MODIFY QUEUE, ALT-V screen.
-
-
-
-
- AUTO ADD ECHOMAIL AREAS
-
- Auto-add ECHOmail areas? GFido H (GNHo/GFHido/GQHuickBBS)
-
- D'Bridge has the capability of automatically adding ECHOmail areas that
- don't exist when undefined CONFERENCE TAGS are detected. This can save
- lots of work in setting up areas; all you need to do once they are added
- is to enter the area security and description using LOCAL/ECHOMAIL AREAS.
- Specify which ECHOmail storage format to use for new areas:
-
- /-----------+--------------------------------------------------------------\
- | GNOH | Unknown ECHOmail messages will be tossed to BADECHO. |
- | | |
- | GFIDOH | A new subdirectory will be created and messages will be |
- | | tossed there. The area will be created with Fido storage. |
- | | |
- | GQUICKBBSH | Scans for the highest-used QuickBBS message base number. |
- | | The mail will be tossed and a Quick-type area is created. |
- \-----------+--------------------------------------------------------------/
-
-
-
-
- PROCESS AREAFIX REQUESTS
-
- Process AREAFIX requests? GYesH (GYHes/GNHo)
-
- If D'Bridge should accept and process AREAFIX requests, answer YES here.
- If you answer NO, the requests received will just appear in your NETMAIL
- area and never be processed. D'Bridge only processes requests as they
- are unpacked, not from them existing in the NETMAIL area.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 68
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- AREAFIX INFORMATION
-
- Areafix information: G1:110/68 PASSWORD ABC,501 Normal Yes Yes AREAS68.BBSH
-
- This window controls the AREAFIX subsystem, allowing automated area
- list and ECHOmail distribution management. For each system, specify:
-
- <GADDRESSH> <GPASSWORDH> <GGROUPS,LEVELH> <GPRIORITYH> <GRESCAN?H> <GFWD REQ?H> <GAREAS.BBSH>
-
- Where:
-
- <GADDRESSH> is the address of the system in the form ZONE:NET/NODE.POINT
-
- <GPASSWORDH> is a codeword agreed upon by both systems (you and the system
- specified.) The password may be from 1 to 32 characters.
-
- <GGROUPS,LEVELH> contains the groups allowed and security level assigned to
- the system. ie. ABC,501 allows groups GAH, GBH and GCH and areas with a security
- level equal to or less than G501H.
-
- <GPRIORITYH> is the EMAIL priority associated with the link. In most cases,
- you would use CRASH for systems in your local calling area and NORMAL or
- HOLD for long-distance links. Valid priorities are: Immediate, Crash,
- Normal and Hold.
-
- <GRESCAN OK?H> asks whether the specified system should be allowed to
- request a complete rescan of a conference as it is added. Normally,
- this is acceptable, but if your system is particularly busy, you may
- want to disallow this by answering NO.
-
- <GFWD REQ?H> determines whether requests for unavailable ECHOmail areas
- will be forwarded to your ECHO hub(s). If you answer GYesH, all unknown
- requests will be passed along to the first applicable ECHOmail hub.
-
- <GAREAS.BBSH> specifies the filename of the system's AREAS.BBS file to
- use when forwarding requests. This should only be specified for the
- systems which are your ECHOmail hubs or feeds. Any conference listed
- in this file may be requested by other allowed systems. Make sure these
- lines are listed in the desired search order.
-
- * REMEMBER * GCTL-NH inserts lines, GCTL-YH deletes lines in a window.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.06 PACKET MAIL CONTROL
- 69
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- REMOVE EMPTY PASSTHRUS
-
- Remove empty passthrus? GYesH (GYHes/GNHo)
-
- ECHOmail hubs which carry many passthru areas may wish to remove
- unused conferences automatically. D'Bridge will erase these unused
- areas a few days after the last ECHOmail feed is cut. GAREAFIXH
- GTIMEOUT DAYSH controls the number of inactive days to wait
- before killing the last feed and sending an AREAFIX request to
- your feed, removing the conference.
-
-
-
-
- AREAFIX TIMEOUT DAYS
-
- Areafix forwarding days? G3 H
-
- This parameter controls the number of days to wait for a new conference
- to arrive after forwarding a request. After this many days, if a new
- conference requested has not been received, a message is generated to
- the original requesting system, explaining why their request was not
- honored.
-
- This also controls the number of days before removing a passthru area
- with no links left.
-
-
-
-
- UNKNOWN AREA FORWARDING
-
- Unknown area forwarding: G H
-
- Here, you may specify the address of an ECHOmail hub to use "blindly",
- forwarding AREAFIX requests for unknown areas. If the area is not found
- in any listed AREAS.BBS file, it will be sent to the specified system.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.07 XMAIL CONTROL
- 70
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.07 XMAIL CONTROL
-
-
- The GXMAIL CONTROLH screen allows you to configure the various compression
- and decompression software that is used to bundle XMAIL packets. Parameters
- include:
-
-
- - XMAIL processing interval
- - Size limits
- - Default format
- - Specific formats
- - ZIP, LHA, ARJ, PAK, ARC and ZOO Compress and Decompress commands
-
-
-
-
-
- XMAIL PROCESSING INTERVAL
-
- XMAIL processing interval: G30 H (minutes)
-
- This parameter specifies the minimum time interval between XMAIL processing
- cycles. In the above example, there will be a 30 minute delay between the
- end of one cycle and the start of the next. Any XMAIL received during this
- delay period will not be processed immediately. At the end of the period,
- processing will resume automatically.
-
-
-
-
- XMAIL ARCHIVE SIZE LIMIT
-
- * NOTE * This feature is not currently supported.
-
-
-
-
- XMAIL PACKET SIZE LIMIT
-
- XMAIL packet size limit: G200 H (kilobytes)
-
- This parameter controls the maximum size of outbound ECHOmail .PKT files.
- When ECHOmail is scanned or forwarded, a new packet is started when the
- origin address changes, or the Gpacket size limitH is exceeded. Making
- this field smaller than 50k is not a good idea; neither is exceeding 250k
- in a network using mailers other than D'Bridge.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.07 XMAIL CONTROL
- 71
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- COMPRESSED MAIL FORMAT
-
- Compressed mail format: GZIPH [Press GSPACEH to change]
-
- This specifies the default compression format for outbound XMAIL files.
- Choose either GZIPH, GLHAH, GARJH, GPAKH, GARCH or GZOOH. For D'Bridge
- EMAIL networks, the GZIPH format is most often used. Many public networks
- still require the ARC format. (D'Bridge is capable of unpacking any of
- these archives, providing the decompression program is correctly specified.)
-
-
- GZIPH PKWARE, Inc.
- 7545 N. Port Washington Rd.
- Glendale, WI 53217
- U.S.A.
-
- GLHAH Copyright by Haruyasu Toshizaki
- Japan
- Distributed via electronic means
-
- GARJH Robert K. Jung
- 2606 Village Road West
- Norwood, MA 02062
- U.S.A.
-
- GPAKH NoGate Consulting
- P.O. Box 88115
- Grand Rapids, MI 49518-0115
- U.S.A.
-
- GARCH System Enhancement Associates
- 21 New Street
- Wayne, NJ 07470
- U.S.A.
-
- GZOOH Copyright by Rahul Dhesi
- U.S.A.
- Free noncommercial use permitted
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.07 XMAIL CONTROL
- 72
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ALTERNATE COMPRESSION FORMATS
-
- System-specific formats: GARJ 1:110/68 H
-
- This field allows you to define specific compression formats for certain
- systems. The format is as follows:
-
- <GZIPH/GLHAH/GARJH/GPAKH/GARCH/GZOOH> <Gfilter>
-
- ie.
-
- ARC ALL EXCEPT 1:110/68 .10 .20
-
-
-
-
- ZIP COMPRESS COMMAND
-
- ZIP compress command: G+PKZIP -M H
-
- This specifies the command to move files to a ZIP archive. For PKZIP,
- the G-MH option must be specified.
-
- * NOTE * A plus sign (+) is required before this command.
-
-
-
-
- ZIP DECOMPRESS COMMAND
-
- ZIP decompress command: G+PKUNZIP -O H
-
- This specifies the command to extract files from a ZIP archive. PKUNZIP
- requires the G-OH option to overwrite existing files.
-
- * NOTE * A plus sign (+) is required before this command.
-
-
-
-
- LHA COMPRESS COMMAND
-
- LHA compress command: GLHA M -M H
-
- This specifies the command to move files to a LHA archive. LHA
- requires the GMH command and the G-MH option.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.07 XMAIL CONTROL
- 73
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- LHA DECOMPRESS COMMAND
-
- LHA decompress command: GLHA E -CM H
-
- This specifies the command to extract files from a LHA archive. LHA
- requires the GEH command and the G-CMH option to overwrite existing files.
-
-
-
-
- ARJ COMPRESS COMMAND
-
- ARJ compress command: GARJ M H
-
- This specifies the command to move files to an ARJ archive.
- ARJ requires the GMH command.
-
-
-
-
- ARJ DECOMPRESS COMMAND
-
- ARJ decompress command: GARJ E /U H
-
- This specifies the command to extract files from an ARJ archive.
- ARJ requires the GEH command to decompress and the G/UH switch
- to update (overwrite) files.
-
-
-
-
- PAK COMPRESS COMMAND
-
- PAK compress command: GPAK M H
-
- This specifies the command to move files to a PAK archive.
- PAK requires the GMH command.
-
-
-
-
- PAK DECOMPRESS COMMAND
-
- PAK decompress command: GPAK E /WA H
-
- This specifies the command to extract files from a PAK archive.
- PAK requires the GEH command to decompress and the G/WAH option
- to overwrite existing files.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.07 XMAIL CONTROL
- 74
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ARC COMPRESS COMMAND
-
- ARC compress command: GARCA | /D H
-
- This specifies the command to move files to an ARC archive.
- ARCA requires the G/DH option to move the files to the archive.
- Note that there is a vertical bar (|) separating the command
- from the G/DH option. This indicates the option comes after
- the file names.
-
-
-
-
- ARC DECOMPRESS COMMAND
-
- ARC decompress command: GARCE | /R H
-
- This specifies the command to extract files from an ARC archive.
- ARCE requires the G/RH option to overwrite existing files. Note that
- there is a vertical bar (|) separating the command from the G/RH option.
- This indicates the option comes after the file names.
-
-
-
-
- ZOO COMPRESS COMMAND
-
- ZOO compress command: GZOO -M H
-
- This specifies the command to move files to a ZOO archive.
- ZOO requires the G-MH command.
-
-
-
-
- ZOO DECOMPRESS COMMAND
-
- ZOO decompress command: GZOO -E H
-
- This specifies the command to extract files from a ZOO archive.
- ZOO requires the G-EH command.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.08 TIME CONTROL SYSTEM
- 75
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.08 TIME CONTROL SYSTEM
-
-
- The GTIME CONTROL SYSTEMH screen allows you to set time-related parameters
- and display historical data. Functions and parameters include:
-
- - UTC offset
- - Daylight savings time status
- - Timezone names
- - Default ClockSync systems
- - Remote clock history
- - Adjustment history
-
-
-
-
- OBSERVE DAYLIGHT SAVINGS TIME
-
- Observe DAYLIGHT SAVINGS TIME at this site? GYesH
-
- In most locations, the time changes twice a year for daylight
- savings time. If your country/state observes this, answer GYesH.
-
-
-
-
- ADJUST MAIL EVENTS
-
- * NOTE * This feature is not currently supported.
-
-
-
-
- ADJUST CLOCKSYNC EVENTS
-
- * NOTE * This feature is not currently supported.
-
-
-
-
- ADJUST DOS EVENTS
-
- * NOTE * This feature is not currently supported.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.08 TIME CONTROL SYSTEM
- 76
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DAYLIGHT TIME STARTS
-
- Daylight time starts: G04/23/92H
-
- Specify the date on which daylight savings time starts. If daylight
- time is currently in effect, use the date last spring when it started.
- If it is late fall or winter and daylight savings time is not in
- effect, use the date on which it will start next spring.
-
-
-
-
- DAYLIGHT TIME ENDS
-
- Daylight time ends: G10/21/92H
-
- Specify the date on which daylight savings time ends. Always make sure
- the ending date is greater than the starting date, next spring.
-
-
-
-
- DAYLIGHT TIME CHANGES
-
- Time of automatic change: G02:01H
-
- Specify the exact time at which daylight savings time changes. In the USA
- it is always 2:01 on a Sunday morning in the spring and fall. For times
- in the afternoon, make sure to use 24-hour format (ie. 13:00 is 1:00pm).
-
-
-
-
- LOCAL STANDARD TIME
-
- Name of local STANDARD time: GEastern Standard Time H
-
- Specify the name of your timezone during standard time.
-
-
-
-
- LOCAL STANDARD TIME ABBREVIATION
-
- Abbreviation for local STANDARD time: GEST H
-
- Specify the commonly accepted abbreviation for your local standard time.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.08 TIME CONTROL SYSTEM
- 77
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- LOCAL DAYLIGHT TIME
-
- Name of local DAYLIGHT time: GEastern Daylight Time H
-
- Specify the name of your timezone during daylight savings time.
-
-
-
-
- LOCAL DAYLIGHT TIME ABBREVIATION
-
- Abbreviation for local DAYLIGHT time: GEDT H
-
- Specify the commonly accepted abbreviation for your local daylight time.
-
-
-
-
- DISPLAY TIME DATA
-
- Display comparative time data? GNo H
-
- On inbound as well as outbound calls D'Bridge will compare its time
- with that on other systems it connects to. If you want this data to
- be displayed in the LOG window, answer GYesH here.
-
-
-
-
- TIME WARNING THRESHOLD
-
- Display average time-difference if: G5 H minute(s) or more
-
- On inbound as well as outbound calls D'Bridge will compare its time
- with that on other systems it connects to. A history is kept and
- average differences are computed. If you wish to see a warning when
- the average time difference exceeds a certain threshold, specify the
- number of minutes here.
- In this example, a warning will be displayed when the average time
- difference exceeds 5 minutes.
-
- To reset this warning display, you will need to GZHero the clock history
- screen.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.08 TIME CONTROL SYSTEM
- 78
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- CLOCK HISTORY FOR
-
- Store data from the clocks on: GALL H
-
- Specify a filter controlling which systems will be included in
- your time/clock history screen. If there are some systems you
- wish to exclude, use: GALL EXCEPT nnn/nnn nnn/nnn ... etcH.
-
-
-
-
- CLOCKSYNC SYSTEM
-
- Always synchronize clock with: G1:3601/14 H
-
- You have the option of setting your clock using a certain system both on
- demand and every time you connect with it. In this example, my system
- will always synchronize its clock to 1:3601/14, a "D'Bridge Universal
- TimeBase."
-
- In most cases, leave this blank.
-
-
-
-
- AUTOMATIC CLOCKSYNC SYSTEM
-
- Default ClockSync timebase: GAtomic clock H
-
- If you start D'Bridge with the clock obviously wrong, it will set its
- clock using the specified system. Leaving it blank will make it call
- the atomic clock at the U.S. Naval Observatory near Washington D.C.
-
- The only time this happens automatically is when the date is set to
- before this release of D'Bridge occurred -- the clock is wrong without
- a doubt. (This occurs when there is no battery-backed clock on an
- XT most frequently.)
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.08 TIME CONTROL SYSTEM
- 79
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- CLOCK SET COMMAND
-
- DOS command after clock adjustment: G H
-
- Some computers, usually XTs, require a command to be issued to set
- the battery-backed clock which is not on the motherboard. If you own
- such a clock, you probably know what this means. If you don't, leave
- this field blank.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.09 FUNCTION KEYS
- 80
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.09 FUNCTION KEYS
-
-
- The GFUNCTION KEYSH screen allows you to define programmable function keys
- for use within D'Bridge.
-
-
-
-
-
-
- USER FUNCTION
-
- There are 19 programmable function keys that may be made available from
- the main menu or D'Bridge idle state. GF2H through GF10H and GALT-F1H through
- GALT-F10H may be programmed to execute any number of DOS commands or spe-
- cial functions.
-
- As well as DOS commands, the following functions are available here:
-
- /----------------+-----------------------------------------------------------\
- | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory |
- | | available to the application. |
- | | |
- | G-H(command) | Causes the command to be executed inside the queue |
- | | window. Only use this for programs that do standard |
- | | DOS I/O. |
- | | |
- | G*RH | This will force a rescan of the queue. Same as ALT-Q |
- | | |
- | G*SH | This will force a complete ECHOmail rescan. |
- | | |
- | G*X<errorlevel>H | This causes an exit with the specified DOS errorlevel. |
- \----------------+-----------------------------------------------------------/
-
- * NOTE * You must NEVER load a TSR using this method. It will cause
- a system crash when D'Bridge resumes.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 81
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.10 BBS CONFIGURATION
-
-
- The GBBS CONFIGURATIONH screen allows you to set up an interface between your
- BBS system and D'Bridge. Parameters include:
-
- - EMAIL calls only text
- - Press ESC for BBS text
- - Loading BBS text and filename
- - Human caller timeout
- - BBS online hours
- - After hours file
- - Minimum baud rate
- - Too slow file
- - ECHOmail scan
- - DOS commands for BBS
-
-
-
-
- BBS SOFTWARE INSTALLED
-
- BBS software installed? GYesH
-
- If you are using D'Bridge as the "front-end" for a bulletin board system
- (BBS), answer "YES" to this question. If you do not want D'Bridge to run
- another program (such as a BBS) when "humans" call, specify "NO."
-
-
-
-
- EMAIL CALLS ONLY TEXT
-
- "EMAIL calls only" text: GPlease hang up... accepting EMAIL calls only. H
-
- If a human caller dials in when D'Bridge is not accepting human callers
- during the current mail event, this line of text will be displayed on
- the caller's terminal. This is also displayed if you have answered GNoH
- to "BBS software installed."
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 82
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PRESS ESC FOR BBS TEXT
-
- "Press ESC for BBS" text: GPress the ESC key twice to access the BBS. H
-
- When someone first dials into D'Bridge, it displays its copyright notice
- and this text. You may specify any message you wish to replace the stan-
- dard message, but remember you should inform the caller to 'press the
- GESCH key twice for faster access' in this line.
-
-
-
-
- LOADING BBS TEXT
-
- "Loading BBS" text: GBBS now loading - Please wait... H
-
- This text will be displayed when a human caller presses the GESCH key
- twice or the "human caller timeout" has expired. This is to inform
- the caller that the BBS is currently loading and that he should wait.
-
-
-
-
- LOADING BBS FILE
-
- "Loading BBS" file: GC:\DB\LOADBBS.TXT H
-
- If you wish to display some sort of "banner" file when the BBS is
- loading, specify the name of a text file here. You may use ANSI codes
- and IBM graphics if you wish, but keep in mind that not all callers
- have computers compatible with IBM ANSI. You're best off keeping it
- printable ASCII (32-126 decimal).
-
-
-
-
- HUMAN CALLER TIMEOUT
-
- "Human" caller timeout: G20H
-
- Specify the number of seconds D'Bridge should wait before determining
- that a call is "human" and not an EMAIL call. The minimum value for
- this field is 10 (seconds), but you may want to make this time longer
- if you have "noisy" phone lines or trouble with inbound connections.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 83
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- BBS ONLINE HOURS
-
- BBS online hours: G06:00H until G23:00H
-
- This field allows you to specify the hours of operation for your BBS.
- If a human caller is detected outside of these hours, the "After hours"
- file will be transmitted and D'Bridge will hang-up. This is another
- way besides the use of mail events to restrict BBS access times.
-
-
-
-
- AFTER HOURS FILE
-
- "After hours" file: GC:\DB\BBSHOURS.TXT H
-
- If you restrict the hours of operation of your BBS, you need to prepare
- a text file in which you explain your policy to human callers. Specify
- the name of a text file here; it will be transmitted to all human callers
- dialing in outside the specified time frame.
-
-
-
-
- MINIMUM BAUD RATE
-
- Minimum baud rate: G1200 H
-
- If you wish to restrict BBS access to those callers that have a faster
- modem, specify the minimum allowable baud rate here. In this example,
- 300 baud callers will be rejected and the "Too slow" file will be sent.
-
-
-
-
- TOO SLOW FILE
-
- "Too slow" file: GC:\DB\TOOSLOW.TXT H
-
- If you have specified a minimum baud rate for BBS access, this file
- will be transmitted to callers with slower modems. If you're going
- to reject callers based on baud rate, the least you can do is explain
- your policy...
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 84
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SCAN ECHOMAIL AFTER CALL
-
- Scan ECHOmail after call? GYesH
-
- If you wish to rescan all ECHOmail areas after each BBS call, answer
- GYesH here. This allows for immediate turnaround on ECHOmail entered
- through the BBS software.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 85
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DOS COMMANDS FOR BBS
-
- DOS commands for BBS: G H
-
-
- Here, you specify the DOS commands that will be used to invoke the BBS,
- telling it you already have a caller on. There are two methods for
- doing this: SPAWNING and EXITING. The most popular method is to SPAWN
- the BBS - leaving D'Bridge in memory. EXITING is used only when there
- is not enough memory to SPAWN the entire BBS system. In this field,
- you simply list the DOS commands you want D'Bridge to run to invoke
- the BBS. There are several "special" commands that substitute values
- or cause an EXIT:
-
-
-
- /----------------+-----------------------------------------------------------\
- | G+H(command) | Causes D'Bridge to swap to disk, leaving more memory |
- | | available to the application program. |
- | | |
- | G-H(command) | Causes the command to be executed inside the queue |
- | | window. Only use this for programs that do standard |
- | | DOS I/O. |
- | | |
- | G*BH | This is replaced by the baud rate of the connection. |
- | | |
- | G*CH | This is replaced by the actual or translated connect |
- | | string from the modem. |
- | | |
- | G*PH | This is replaced by the comm port number (G1H-G8H) |
- | | |
- | G*RH | This will force a rescan of the queue. Same as ALT-Q |
- | | |
- | G*SH | This will force a complete ECHOmail rescan. |
- | | |
- | G*TH | This is replaced by number of minutes until the next |
- | | event defined in "schedule maintenance." |
- | | |
- | G*XH | This causes an exit with the errorlevel corresponding |
- | | to the baud rate divided by 100. ie. 1200 baud = 12 |
- | | |
- | G*X<errorlevel>H | This causes an exit with the specified DOS errorlevel. |
- \----------------+-----------------------------------------------------------/
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.10 BBS CONFIGURATION
- 86
- --------------------------------------------------------------------------------G
-
-
-
-
- As an example, here's what my DOS BBS COMMANDS field looks like to run
- Opus, then execute the MYMAIL program (An Opus MAIL-CHECK program by
- Steve Sullivan):
-
- cd \opus
- opus opus -t*t -p*p -b*b
- mymail -u
-
- When a caller dials in at 2400 baud with 120 minutes until the next
- event, D'Bridge runs the following DOS commands:
-
- cd \opus
- opus opus -t120 -p1 -b2400
- mymail -u
-
- After all these commands are complete, D'Bridge initializes the modem
- and returns to its previous status (Mail event, IDLE, etc.).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 87
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.11 SECURITY MISCELLANEOUS
-
- The GSECURITY/MISCELLANEOUSH screen allows you to setup various parameter
- which affect security or are somehow "miscellanneous." Parameters include:
-
- - Hang-up on security violation
- - Ignore unauthorized mail packets
- - Rename unauthorized files
- - Allow unlisted nodes to send mail
- - File request controls
- - Session passwords
- - Automatic password request control
- - Function requests
- - Gateways
- - External receivers
- - Fidonet and WaZOO protocol overrides
-
-
-
-
-
- HANG UP ON SECURITY VIOLATION
-
- Hang-up on security violation? GNo H
-
- If you are using SESSION PASSWORDS to protect any or all of your
- links, you may choose to hang-up and not accept any mail from any
- system with a missing or invalid password. This option has no effect
- on systems that have no password specfied. Used in conjunction with
- GSecured ECHOmail onlyH, this provides a fairly good security method
- for ECHOmail traffic.
-
-
-
-
- IGNORE UNAUTHORIZED MAIL PACKETS
-
- Ignore unauthorized mail packets? GNo H
-
- If you are using SESSION PASSWORDS to protect any or all of your
- links, you may choose to completely ignore incoming mail from a link
- using the wrong (or no) password. If you indeed wish to ignore this
- mail, specify GYesH to this field. If you want to receive the mail
- normally, answer GNoH.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 88
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- RENAME UNAUTHORIZED INBOUND FILES
-
- Rename unauthorized inbound files? GYesH
-
- If you are using SESSION PASSWORDS to protect any or all of your
- links, you may choose to rename incoming files to BADFILE.001,
- BADFILE.002, etc.
- The reason for doing this is to prevent unauthorized ECHOMAIL and
- FUNCTION REQUESTS from being executed. Specify GYesH if you want to
- automatically rename incoming files or GNoH if you want to receive
- them normally.
-
-
-
-
- ALLOW UNLISTED NODES TO SEND MAIL
-
- Allow unlisted nodes to send mail? GYesH
-
- In a private network, possibly the BEST way to discourage hackers from
- the outside is to hang-up on them immediately. If you specify GYesH to
- this question, D'Bridge will immediately reject any incoming call from
- a system not listed in your nodelist. This should only be used in a
- private network - public networks often have communications from new
- addresses or private addresses that are not in the nodelist (yet).
-
-
-
-
- FILE REQUESTS FOR UNLISTED NODES
-
- File-requests for unlisted nodes? GYesH
-
- If you support file-requests, you must decide whether or not you wish
- to allow systems that are NOT in your nodelist to request files. Some
- people (kids, usually) will abuse your system's file-request privilege
- by calling back many times, using many fake node numbers to file-request.
- If you say GYesH to this question, any system, listed or not will be able
- to issue file-requests. If you say GNoH then only requests from systems
- found in your nodelist will be honored.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 89
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TIME LIMIT FOR FILE REQUESTS
-
- Time limit for file-requests: G30 H (minutes)
-
- When you are running a public system, you may find you have trouble with
- people abusing the file-request privilege by constantly requesting too
- many files and keeping your system busy for hours. D'Bridge allows you
- to limit the time allowed for file-requests. Here you may limit the num-
- ber of minutes allowed before refusing to honor a request.
-
-
-
-
- FILE REQUEST LIMIT
-
- File-request limit: G500 H (kilobytes)
-
- You may limit the total number of kilobytes allowed for file-request
- by specifying it here. It is suggested you make this larger than the
- biggest file you have available for request.
-
-
-
-
- MAXIMUM FILES FOR FILE REQUEST
-
- Maximum files for file-request: G10 H
-
- You may limit the total number of files allowed for request. This
- is really not as meaningful as the other limits because time is the
- main factor requiring a limitation.
-
-
-
-
- CHECK LIMITS BEFORE OR AFTER
-
- Check limits BEFORE or AFTER? GAfter H
-
- This specifies whether the file-request limits are tested BEFORE or
- AFTER each file is transferred. Personally, I prefer testing AFTER
- because I like to allow people to request any file on my system; some
- files on my system are larger than the FILE-REQUEST LIMIT (K.)
- If the limits are checked BEFORE each transfer, it would be impossible
- to file-request any file larger than the size limit.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 90
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ENFORCE LIMITS FOR 24 HOURS
-
- Enforce limits for 24-hours? GNo H
-
- If you wish to accumulate these file-request limits for a 24-hour
- period, answer GYesH here. If you want the limits enforced on a
- per-call basis, answer GNoH. If the limits are enforced for 24-hours,
- a file is created containing the address, timestamp and limit data.
- The limit will be reset exactly 24-hours from the START of the first
- file-request. If you must manually reset these limits, delete the
- file "DBRIDGE.FRS."
-
-
-
-
- MINIMUM BAUD RATE FOR REQUESTS
-
- Minimum baud rate for request? G1200 H
-
- This specifies the minimum link rate (baud) allowed for file-requests.
- (300/1200/2400/4800/9600... Etc.)
-
-
-
-
- SESSION PASSWORDS
-
- Session passwords: G1:3601/14 SECRET H
-
- In a corporate environment, or a public network where security is
- becoming a problem, you may specify a SESSION PASSWORD for each system
- you plan to communicate with directly. This password must be specified
- by BOTH systems and must be agreed upon in advance. Once in place, it
- becomes impossible to communicate with the other system if you don't
- use the same password.
-
- A password will prevent an unauthorized system from picking up mail.
- With HiTek comes Hi-Tech hackers. It is not hard to change your address
- to something else, then poll your host to see what mail you can "steal".
- Any "link" protected with a password is not vulnerable to this simple
- form of "mail-stealing". For a password with 135/20, type:
-
- 135/20 WALLY (Where "WALLY" is the desired SESSION PASSWORD)
-
- Any number of session passwords may be defined. Remember, in the above
- example, it is important 135/20 also sets up a SESSION PASSWORD for my
- address, 110/68, or it won't work. Both ends must use the same password!
- (Passwords must be eight letters or less).
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 91
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- AUTOMATIC PASSWORD REQUEST FOR
-
- Automatic password request for: G201:ALL 1:110/ALL H
-
- D'Bridge has the capability to automatically establish session passwords
- with new links. This field specifies a filter that controls which EMAIL
- addresses that you wish to request an automatic session password be added.
- If you wish to disable this feature, specify GNONEH as the filter.
-
- * NOTE * This field only affects GoutboundH calls.
-
-
-
-
- ALLOW PASSWORD REQUESTS FROM
-
- Allow password requests from: GALL H
-
- The D'Bridge GAutomatic Password Request SystemH allows a remote system to
- request that a session password be established automatically. If a calling
- system makes this request, the answering system creates a random 8-character
- password and transmits it back using the EMSI handshake.
-
- This field specifies a filter that controls which EMAIL addresses that you
- wish to allow password requests from. If you wish to disable this feature,
- specify GNONEH as the filter.
-
- * NOTE * This field only affects GinboundH calls.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 92
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FUNCTION REQUESTS
-
- Function requests: G H
-
- A FUNCTION REQUEST is an online service provided to calling systems
- while they are still "on the line". FUNCTION REQUESTS only work with
- other WaZOO-based EMAIL systems such as D'Bridge, FrontDoor, Opus and
- BinkleyTerm. This is a VERY advanced feature and will not be used by
- most systems, so don't feel bad if you don't understand this...
-
- A function request can be defined in four steps:
-
- 1) The caller sends the REQUEST FILE.
-
- 2) D'Bridge recognizes the filename as being a FUNCTION REQUEST
- and spawns the REQUEST SERVER task. (user-provided)
-
- 3) The REQUEST SERVER (a program provided by the user) takes its
- input data from the REQUEST FILE and the CALLER.FIL file cre-
- ated by D'Bridge. It prepares output file(s) to send back to
- the caller plus an OUTPUT FILE LIST telling D'Bridge which
- files to send.
-
- 4) When the REQUEST SERVER has terminated, D'Bridge then transmits
- all the files listed in the OUTPUT FILE LIST, deletes them, and
- continues to send the rest of the "pickup" mail.
-
-
- To use this feature, you must either write your own REQUEST SERVER or
- use one of the existing systems such as ML-INQ.
-
- The format for the FUNCTION REQUESTS field is:
-
- <REQUEST FILE> <OUTPUT FILE LIST> <DOS COMMAND>
-
- For an example, I'll explain how I run the ML-INQ program on my system.
- ML-INQ stands for Megalist Inquiry. The Megalist is another program I
- wrote that creates a "master file listing" for all participating Fido
- and Opus systems. The list got so huge, I decided to add an on in-
- quiry service. To access the MegaList Inquiry feature, the calling sys-
- tem simply creates a text file containing a list of filenames to search
- for; this file is called MEGALIST.INQ. Anytime D'Bridge receives a file
- called MEGALIST.INQ, the REQUEST SERVER "ML-INQ" is executed.
- Here's what I have in my FUNCTION REQUEST field:
-
- MEGALIST.INQ MEGALIST.LST ML-INQ
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 93
- --------------------------------------------------------------------------------G
-
-
-
- The ML-INQ program first opens the file "CALLER.INF" to get general
- information about the system and the caller. CALLER.INF is a text
- file created automatically by D'Bridge just before spawning the REQUEST
- SERVER task. Here's what my CALLER.INF contains at the moment:
-
- 1:101/200 (The Fidonet address)
- TC-Trader (The system name)
- Cheryl Buzzell (The operator name)
- C:\DB\FILES\ (My INBOUND FILES DIRECTORY path)
-
- ML-INQ then opens the file "C:\DB\FILES\MEGALIST.INQ" to get the actual
- request from the caller. Then, it prepares the file "MEGALIST.OUT" con-
- taining the results of the search. Finally, ML-INQ creates the OUTPUT
- FILE LIST, this time called MEGALIST.LST (in the current directory);
- this file contains the list of files to send back to the caller, then
- erase. In this case, the OUTPUT FILE LIST only contains MEGALIST.OUT.
-
- Finally, ML-INQ returns control to D'Bridge and the file gets sent and
- deleted as specified. The request file, MEGALIST.INQ, is also erased.
-
- A request server may transmit files without erasing them (if they are
- available for file-request) simply by creating a WaZOO-style request
- file (with the extension .REQ) in the INBOUND FILES DIRECTORY. D'Bridge
- will treat these files like inbound file requests.
-
- IMPORTANT: It is essential that any REQUEST SERVER takes no more than
- 30 seconds to execute. Taking more time than this can cause
- the calling system to timeout and hang-up.
-
-
-
-
- EXTERNAL RECEIVERS
-
- External receivers: GCONNECT FAX|*X50 H
-
- This feature is designed for use with combination modems that also
- handle FAX and/or VoiceMail. The above example causes D'Bridge to
- exit with errorlevel 50 when a "GCONNECT FAXH" response is received
- from the modem.
-
- The syntax for this field is: <GMODEM RESPONSEH>|<GDOS commandH>
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 94
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EXTERNAL GATEWAYS
-
- External gateways: G H
-
- Again, this is a VERY advanced feature and will not be used by 99% of
- the D'Bridge systems out there; this is for the other 1%:
-
- An EXTERNAL GATEWAY allows D'Bridge to act as a "front-end" for up to
- 20 other EMAIL receivers at the same time. The way this works, is by
- defining a specific "SYNC" sequence; D'Bridge can look for that sequence
- and spawn another EMAIL system while the calling system is still on.
- This way, D'Bridge can be compatible with as many systems as possible.
- As of this time, I know there are gateway programs for UUCP and USENET.
- I'm sure there are others I just don't know about.
-
- As an example, let's say I want to install a UUCP mail receiver "on
- top" of D'Bridge. I have a program written for the IBM PC which will
- receive mail when a call is received. Assuming this program features
- an option to respond to a call already in progress and terminate after
- finishing the session, it is compatible. The first thing you need to do
- is figure out what the SYNC sequence is.
-
- A SYNC sequence is the sequence of bytes the calling system sends to
- the receiving system (multiple times) until the receiver responds with
- an acknowledgment that it is ready to begin a mail session.
- D'Bridge can be programmed to recognize up to 20 separate sequences of
- up to 16 bytes each and spawn a different task depending on which one
- is received. For example, let's say your UUCP transmitter continuously
- sends the sequence: 9F, A9, 9F, A9... (hex) until the receiving system
- acknowledges. For this sequence, simply specify your EXTERNAL GATEWAYS
- field as:
-
- 9F/A9 UUCP_RCV -b*b -p*p
-
- As soon as an incoming call is detected sending the sequence 9F, A9,
- D'Bridge will spawn the UUCP mail receiver with the following command
- line:
-
- UUCP_RCV -b2400 -p1
-
- Just like described in DOS BBS COMMANDS, the BAUD RATE and PORT NUMBER
- can be substituted by using a *B and *P respectively.
- It is up to the spawned task (UUCP_RCV in this case) to handle the mail
- session from this point on; it should terminate as soon as the mail is
- received and make sure it doesn't answer any calls itself.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.11 SECURITY MISCELLANEOUS
- 95
- --------------------------------------------------------------------------------G
-
-
- GH
-
-
-
- Because of the normal operation of D'Bridge, we've restricted three
- characters: 1B (Escape), AE (Fidonet TSYNC), and F1 (WaZOO YOOHOO
- character). These three bytes may not be a part of your SYNC string.
- It is also suggested you use bytes with high parity (greater than 7F
- (hex)) to prevent "human" users from easily activating your alternate
- mailer.
-
-
-
-
- FIDONET PROTOCOL FOR
-
- Fidonet protocol for: GNONE H
-
- If you want to override the default EMSI/WAZOO protocol D'Bridge uses
- and revert to XMODEM/TELINK protocols, specify the NET/NODE filter here.
- This field should contain "NONE" in all but the strangest setups.
-
-
-
-
- WAZOO PROTOCOL FOR
-
- WaZOO protocol for: GNONE H
-
- If you want to override the default EMSI protocol D'Bridge uses and
- revert to the YOOHOO-YOOHOO/2U2 handshake, specify the NET/NODE filter
- here. This field should contain "NONE" in all but the strangest setups.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.12 DISK SPACE MINIMUMS
- 96
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.12 DISK SPACE MINIMUMS
-
-
- The GDISK SPACE MINIMUMH screen allows you to set minimum criteria for system
- operation:
-
- - System operation minimum
- - BBS operation minimum
- - Unpack/forward minimum
-
-
-
-
- SYSTEM OPERATION
-
- The system operation line specifies the minimum disk space allowed (in Kb)
- before D'Bridge will completely shut down. Once shut down, D'Bridge will
- not reactivate without human interaction. Either disk space must be
- freed, or DB SETUP must be used to change the minimum.
-
-
-
-
-
- BBS OPERATION
-
- The BBS operation line specifies minimum disk space criteria for BBS
- operation. If disk space is below specified criteria, human callers
- will be told the BBS is offline due to disk space shortage.
-
-
-
-
- UNPACK FORWARD
-
- The unpack/forward line specifies the minimum disk space required before
- a mail packet may be decompressed or unpacked. Once this limit is
- reached, all ECHOmail and NETMAIL unpacking will be halted.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.13 ACCOUNTING TRANSLATION
- 97
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.13 ACCOUNTING TRANSLATION
-
-
- The GACCOUNTING/TRANSLATIONH screen allows you to set up costing data and
- controls which determine where D'Bridge calls and when. This system allows
- for minimum telecommunications cost when NORMAL priority is used. A default
- table of USA-EAST.COS (an exported file) is included by default. Contact your
- nearest D'Bridge dealer for a local, more recent cost file.
-
-
-
-
- PREFIX
-
- Prefix: G1-513- H
-
- This is the "key" to the database record. You cannot change it. If
- you must, you need to remove and add the record again. The PREFIX field
- is the first part of a phone number (which will be replaced with the
- TRANSLATE TO field when a number is dialed).
-
-
-
-
-
- TRANSLATE TO
-
- Translate to: G1- H
-
- When phone number are translated, this field will be used to replace the
- PREFIX for dialing. The field is actually broken down into two subfields:
- PREFIX and SUFFIX. If you need to dial something after the number,
- such as a credit card or billing account number, you may specify a SUFFIX
- by using a vertical pipe ( | ) to separate the PREFIX from the SUFFIX.
- An example would be: 1-305-370|,,3188. ",,3188" would be sent to the modem
- after dialing. The two commas represent a modem command meaning "pause a
- few seconds before dialing the following digits".
-
-
-
-
-
- LOCATION
-
- Location: GSouthwestern Ohio H
-
- This is just a description field for your information.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.13 ACCOUNTING TRANSLATION
- 98
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- COST DATA SOURCE
-
- Cost data source: GTableH
-
- Here, you either specify GTableH or GXrefH for the data source. If you
- use GXrefH, you will be prompted for another prefix to cross-reference.
- Otherwise, you will use the table listed below...
-
- The box at the bottom of the screen contains the cost information.
- In order to keep communications costs low, D'Bridge has adopted a
- system of "cost-based control". This means the system can be programmed
- to place all calls during the most economical periods based on this
- cost screen entirely. The cost-information for calling a given country
- or city can be acquired by calling your long-distance company.
- Typically, there are different rates on different days and at different
- times. This table allows you to specify up to 5 cost-periods for
- accounting and control purposes.
-
- When D'Bridge looks at these cost-tables, it searches from the top of
- the list to the bottom, stopping on the first match. For this reason,
- "catch-all" entries, like the one shown at the bottom of our example
- should be listed last. For flexibility and simplicity, you are allowed
- to define overlapping periods, but nevertheless D'Bridge will always
- select the first applicable period for accounting and control.
- Please note that any time-ranges left undefined are assumed "free" and
- D'Bridge will actually try to dial out during these times. Therefor:
- GDON'T LEAVE ANY TIME-RANGE UNSPECIFIED.H
-
-
-
-
-
- REFERENCE PREFIX
-
- Reference prefix: G1- H
-
- When using a cross-referenced table, you must specify the prefix whose
- table you wish to use for costing and control purposes. The translation
- will still be based on the data listed above, but now it will be applied
- to the referenced table.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.13 ACCOUNTING TRANSLATION
- 99
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TABLE WEEKDAYS
-
- All S M T W T F S H
-
- In these fields, specify for which day(s) the costing-line is applicable.
- Any non-blank character will designate a weekday. GHH stands for holiday.
-
-
-
-
- TABLE START TIME
-
- Here, you specify the starting time for the cost period. Make sure you
- use 24-hour time format (e.g. 23:00 is 11:00 pm).
-
-
-
-
- TABLE END TIME
-
- In this field, you specify the ending time for the cost period.
-
-
-
-
- TABLE NCI
-
- Here's the CRITICAL part to understand. During a given cost-period, you
- may choose which priorities of mail you would like to be sent. In the
- NCI field, you may specify any or all of the letters GNH, GCH and GIH, desig-
- nating the priorities NORMAL, CRASH and IMMEDIATE. If you list all three
- "GNCIH," then all priorities of mail are allowed to be sent during this
- cost-period. If you enter "GCIH," then just CRASH and IMMEDIATE mail
- will be sent. This allows you to send NORMAL priority mail during the
- low-cost periods and higher priority mail anytime (that's what this
- example shows).
-
-
-
-
- TABLE FIRST PERIOD COST
-
- In this field, enter the cost associated with the first billing period.
- This is a decimal number with three digits after the decimal point.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.13 ACCOUNTING TRANSLATION
- 100
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TABLE FIRST PERIOD SECONDS
-
- Specify the number of seconds on which the FIRST PERIOD COST field
- is based. In the United States, this is normally "60", but other
- countries and/or long-distance carriers may have a different billing
- increment.
-
-
-
-
- TABLE SUBSEQUENT PERIOD COST
-
- In this field, enter the cost associated with the subsequent billing
- periods. This is a number with three digits after the decimal point.
-
-
-
-
- TABLE SUBSEQUENT PERIOD SECONDS
-
- Specify the number of seconds on which the SUBSEQUENT PERIOD COST field
- is based. In the United States, this is normally "60", but other
- countries and/or long-distance carriers may have a different billing
- increment.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.14 ZMODEM PARAMETERS
- 101
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.14 ZMODEM PARAMETERS
-
- The GZMODEM PARAMETERSH screen allows you to set the behavior of the ZMODEM
- protocol which D'Bridge uses to send EMAIL. Parameters include:
-
- - Starting block size
- - Maximum block size
- - Recover block size
- - Block step rate
- - Direct ZMODEM
-
-
-
-
- STARTING BLOCK SIZE
-
- This is the block size to be used at the start of a ZMODEM file-transfer.
- This must be a power of two between G32H and G8192H (G32H, G64H, G128H, G256H, G512H,
- G1024H, G2048H, G4096H or G8192H).
-
-
-
-
- MAXIMUM BLOCK SIZE
-
- This is the largest block size D'Bridge will use in ZMODEM. The value
- will increase from the STARTING BLOCK SIZE to MAXIMUM BLOCK SIZE using
- the BLOCK STEP RATE specified here.
-
-
-
-
- RECOVERY BLOCK SIZE
-
- This is the block size to be used after an error has been reported by
- the receiver. Normally, this value should be less than the starting
- block size because where there is one error (phone noise) there may im-
- mediately be another. Making the recovery block size small reduces the
- amount of time it takes the system to recover from bad line noise.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.14 ZMODEM PARAMETERS
- 102
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- BLOCK STEP RATE
-
- When the ZMODEM sender is not receiving error reports from the receiver,
- it will increase the block size by doubling it after "x" successful
- blocks until it reaches the MAXIMUM BLOCK SIZE specified. The BLOCK
- STEP RATE is "x". In other words, it tells the system after how many con-
- secutive good blocks it may increase the block size. By default, D'Bridge
- uses a factor of 4.
-
-
-
-
- DIRECT ZMODEM
-
- When D'Bridge communicates with other EMAIL systems capable of the GDZAH or
- GIZEH protocols, you have the option of increasing throughput an average of
- 1.6% by selecting direct ZMODEM. By answering GYesH to this parameter, the
- protocol will transmit the XON and XOFF characters transparently rather than
- "escaping" them as the ZMODEM specification calls for. If you are having
- ZMODEM trouble, try setting this to GNoH to see if it makes a difference.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.15 SETUP EDITOR OPTIONS
- 103
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.15 SETUP EDITOR OPTIONS
-
- The GSETUP EDITOR OPTIONSH screen allows you to control the behavior of the
- internal editor or configure an extrernal editor such as GoldED.
-
-
-
-
-
-
- EMAIL EDITOR
-
- EMAIL editor: GInternalH (GIHnternal/GGHoldED/GOHther)
-
- This selects the EMAIL editor to be used when ALT-E is pressed or the menu
- option "READ/EDIT EMAIL" is selected. The default is GInternalH, but GGoldEDH
- and many other Fidonet-compatible editors may just as well be used.
-
-
-
-
- EDITOR REBUILD QUEUE
-
- Rebuild queue? GYesH
-
- This parameter gives you the option to automatically rescan the NETmail
- area after EMAIL has been entered or deleted. This scan will happen im-
- mediately after exiting the editor. If you want the mail scanned automa-
- tically, specify GYesH here. It will not scan automatically if you spe-
- cify GNoH.
-
-
-
-
- EDITOR SCAN ECHOMAIL
-
- Scan ECHOmail? GYesH
-
- If you want to send ECHOmail messages immediately after leaving the
- editor, specify YES here. The D'Bridge ECHOmail scanner knows what
- areas need to be scanned if any. If you don't say YES here, then
- ECHOmail will not be sent until an ECHOscan is run either in an event
- or manually using the menu option: GUTILITIESH/GProcess ECHOmailH.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.15 SETUP EDITOR OPTIONS
- 104
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EDITOR SOUND EFFECTS
-
- Sound effects? GYesH
-
- This specifies whether the "warning beeps" will be active in the internal
- editor. Answer GYesH, and change it to GNoH later if the noise bothers you.
-
-
-
-
- EDITOR DEFAULT PRIORITY
-
- DEFAULT: Priority? GNormalH (GIHmmediate/GCHrash/GNHormal/GHHold)
-
- This specifies the default priority for EMAIL messages. The priority de-
- termines when (if at all) the message will be transmitted from the system.
- Four priorities are available, listed here from highest to lowest:
-
-
- GIMMEDIATEH When a message is flagged as IMMEDIATE, it has the
- ultimate priority on the system. All IMMEDIATE
- messages must be transmitted before any other out-
- bound calls are possible. Using this priority is
- quite effective in getting the mail out fast, but
- has the disadvantage of slowing down outbound mail
- traffic if the IMMEDIATE systems are busy or not
- answering.
-
- GCRASHH Messages flagged as CRASH are allowed to be sent
- anytime, 24-hours a day. Unless a "hold" override
- is placed on a system, an EMAIL message with CRASH
- priority will be sent during the UNEVENT or any
- scheduled event. If entered during the day, CRASH-
- priority messages will most-likely be sent at the
- highest phone rates.
-
- GNORMALH When a message is flagged as NORMAL, it will not
- be transmitted until a scheduled mail event occurs.
- Using this priority (usually overnight delivery) is
- the most cost-effective way to use D'Bridge for EMAIL.
-
- GHOLDH When a message is flagged as HOLD, it will not be
- sent until the destination system polls or another
- non-HOLD message is entered. Use HOLD priority if
- you intend for most systems to call to pickup their
- mail.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.15 SETUP EDITOR OPTIONS
- 105
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EDITOR FORCED ROUTING
-
- Forced Routing: GNone H (GDHirect/GHHub/GNHone)
-
- Choose the desired routing method for NETmail messages entered using the
- internal editor:
-
- GDIRECTH This designates all messages (by default) to go directly
- to the destination systems, bypassing any event-specific
- routing controls.
-
- GHUBH This defaults all messages to be HUB- or HOST-routed.
-
- GNONEH This defaults to standard routing as defined in each
- mail event.
-
-
-
-
- EDITOR DEFAULT PRIVATE
-
- Default private? GYesH
-
- This specifies whether the editor will default all new messages to
- private status or not. "Private" usually means the EMAIL is only
- intended for the receiver. However, you should note that mail can
- be read on all systems it passes through (unless the messages are
- encrypted somehow).
-
-
-
-
- EDITOR DEFAULT KILL SENT
-
- Default Kill/Sent? GNo H
-
- This specifies the default for the "Kill when sent" flag in the editor.
- If you have no use for a copy of outbound mail, you might want to
- specify GYesH here. Mail flagged KILL/SENT is erased after being sent
- to the next destination.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.15 SETUP EDITOR OPTIONS
- 106
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EDITOR DEFAULT ARCHIVE SENT
-
- Default Archive/Sent? GYesH
-
- This specifies the default for the "Archive when sent" flag in the
- editor. If you want to save a copy of the outbound mail in a text
- file "archive", answer GYesH here. When a message is sent, it will
- be added to the text file, showing the date and time of transmis-
- sion; the original message will subsequently be erased.
-
-
-
-
- EDITOR DEFAULT XMAIL
-
- Default XMAIL? GNo H
-
- This specifies the default setting for the "XMAIL" flag. If set to GYesH, all
- NETmail entered using the internal editor will, by default, be sent as com-
- pressed mail utilizing the compression method defined in the XMAIL CONTROL
- screen. When NETmail is marked as XMAIL, it will be marked as sent, deleted
- and/or archived when the queue is built, making it impossible to re-edit the
- message later. Unless this is really what you want, it is suggested you spe-
- cify GNoH here.
-
-
-
-
- EDITOR DEFAULT INSERT
-
- Default insert? GNo H
-
- This specifies the default state of the "insert mode" in the editor.
- Some people prefer to work in insert mode; others don't. If you want
- "insert" to be on in the editor by default, answer GYesH here.
-
-
-
-
- EDITOR DEFAULT INTL ADDRESSING
-
- INTL addressing? GYesH
-
- In the multi-zone world of EMAIL today, it is almost mandatory for all
- NETmail to contain international (zone-aware) addressing. Answer GYesH to
- this question unless there's a REALLY GOOD reason not to do so.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.15 SETUP EDITOR OPTIONS
- 107
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EDITOR QUOTE SEENBYS
-
- Quote SEEN-BYs? GNo H
-
- When entering a quoted reply with the internal editor, this field gives you
- the option of including ECHOmail SEEN-BY information in the reply text. If
- you want this, answer GYesH, otherwise specify GNoH.
-
-
-
-
- EDITOR USERS
-
- Valid users: GChris Irwin,SECRET H
-
- Here, you specify a list of valid users and their "passwords". The
- correct format for a user line with a password is:
-
- <GUSERNAMEH>[,<GOPTIONAL PASSWORDH>]
-
- If more than one line is entered here, every time the editor is run,
- you must specify which user you are. This is for the "FROM" field in
- the message editor. If you only specify one line, you won't have to
- confirm anything (except your password, if specified).
-
-
-
-
- GOLDED PATH
-
- GoldED path: GC:\GOLDED H
-
- If you have chosen GGoldEDH as your EMAIL reader/editor, specify the directory
- path where this program is located.
-
-
-
-
- EDITOR DOS COMMANDS
-
- DOS commands: GC:\MYEDIT\MYEDITOR /C /U H
-
- If you have chosen GOtherH as your EMAIL reader/editor, specify the DOS
- commands to invoke your editor here.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 108
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.16 ECHOMAIL AREAS
-
-
- The GECHOMAIL AREASH screen allows you to define the local and ECHOmail areas
- that you wish to use with D'Bridge.
-
-
-
-
- ECHOMAIL CODEWORD
-
- Codeword: GDBRIDGE H
-
- The CODEWORD is a word from 1 to 16 characters which you designate as a
- mnemonic reference to an area. It could be a word like POL for politics
- or PROG for programming conference. CODEWORDs must be unique - "NETMAIL"
- and "BADECHO" are predefined by the system and may not be used here.
-
-
-
-
- ECHOMAIL ALERT FLAG
-
- Alert flag: GDH
-
- If you wish to be notified (on the status line) about new mail in this
- area, specify a one character "flag" here. When mail is received, the
- mailer will show it by listing the defined "flag" character on the right
- side of the bottom status line.
-
-
-
-
- ECHOMAIL SECURITY LEVEL
-
- Security level: G500 H
-
- The SECURITY LEVEL is used by the AREAFIX subsystem to allow other
- systems to automatically add or delete themselves from ECHO links.
- Security levels range from G0H to G9999H; if a system has a security
- level of 50, it has access to all areas with a SECURITY LEVEL of 50
- or less. If you don't want anyone to have access to an area, define
- its level to be 9999.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 109
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL GROUP SORT
-
- Group/Sort: GA1H
-
- GROUP/SORT is a two-byte field; the first character is the AREAFIX access
- group; the second is the sort code for use with DBUTIL SORT AREAS.
- In AREAFIX, each area is assigned a GROUP code. Each system with an AREAFIX
- password also has one or more group codes associated with it. Only those
- systems with matching GROUP codes have access to a given area.
-
-
-
-
- ECHOMAIL DESCRIPTION
-
- Description: GD'Bridge Support Conference H
-
- This description field will be used throughout the system to describe the
- conference.
-
-
-
-
- ECHOMAIL STORAGE
-
- Storage method: GFido H (GFHido/GQHuickBBS/GNHone)
-
- There are three choices for the storage method of a message base:
-
- GFIDOH With FIDO format, each message is stored in a separate
- file in the specified directory. This is the most
- common storage format among Fidonet-based systems, but
- has the disadvantage of being slower than the other
- formats.
-
- GQUICKBBSH With the QUICKBBS format, messages are stored directly
- in a QuickBBS message base. This base may exist stand-
- alone or in conjunction with a QuickBBS system.
-
- GNONEH If NONE is specified, the area is regarded as an area
- "passing through" your system. The messages are not ac-
- tually stored on this system, just forwarded to the spe-
- cified systems.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 110
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL DIRECTORY PATH
-
- Directory path: GC:\FIDOMAIL\DBRIDGE\ H
-
- Specify the directory path to use for Fido-style messages.
-
- This directory will contain the message files, such as:
-
- GDirectory of C:\FIDOMAIL\DBRIDGEH
-
- G1 MSG 1847 12-06-92 11:15aH
- G2 MSG 1511 12-06-92 11:15aH
- G3 MSG 1459 12-06-92 11:54pH
- .
- .
- Gnnnn MSG 505 12-15-92 11:07aH
-
-
-
-
- ECHOMAIL QUICKBBS AREA NUMBER
-
- QuickBBS areas #: G32 H
-
- Each QuickBBS area must have a unique area number in a range from G1H
- to G200H. If you accidentally assign the same number to different areas,
- you will locally "crosslink" the conferences. Specify a GUNIQUEH number
- here or match your existing BBS setup.
-
-
-
-
- ECHOMAIL DEFAULT PRIVATE
-
- Default private? GNo H
-
- If you want the editor to flag messages as PRIVATE by default, answer GYesH.
- This only affects the internal message editor when entering or replying to
- messages. Most ECHOmail conferences are by nature "public" - Private ECHOmail
- can be read by all receiving system operators.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 111
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL ARCHIVE FILE
-
- Area archive: GC:\ECHO\DBRIDGE.TXT H
-
- If you want D'Bridge to save a copy of each message purged when GDBUTILH
- GPURGEH is run, specify a text file to "archive" them in. Each area may
- write messages to a different file, or you may combine several areas into
- a single text file. If you don't want to save a copy of the messages, just
- leave this field blank.
-
-
-
-
- ECHOMAIL PURGE CRITERIA
-
- Purge except: G100 H messages
-
- Purge after: G30 H days
-
- In the DBUTIL PURGE program, there are two options for deciding which
- messages to erase from the system. When the cursor is on this field,
- you may press the GF10H key to switch between the methods: PURGE EXCEPT
- and PURGE AFTER.
-
- With PURGE EXCEPT, DBUTIL will erase all but "x" messages; specify "x"
- in this field as "how many messages to save after purging". With the
- PURGE AFTER option, DBUTIL will purge messages based on their age.
- PURGE AFTER 30 DAYS means to erase all messages over 30 days old when
- the utility is run.
-
-
-
-
- ECHOMAIL PRESERVE MESSAGES
-
- Preserve: G200 H messages
-
- In DBUTIL PURGE, you may specify a certain number of messages to ignore
- while purging. These will be the lowest-numbered messages in the area
- and contain information you don't want erased such as conference rules,
- etc.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 112
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL AREA TYPE
-
- Area type: GECHOmailH (GEHCHOmail/GLHocal)
-
- User-defined areas are either GLocalH or GECHOmailH. The default is GECHOmailH.
- D'Bridge ignores LOCAL areas except while in the editor; when an ECHOscan is
- executed, all ECHOmail areas are scanned for outbound mail.
-
-
-
-
- ECHOMAIL CONFERENCE NAME
-
- Conference name: GDBRIDGE H
-
- Each ECHOmail area must have a unique CONFERENCE NAME. This may be the
- same as or different from the CODEWORD specified above, but must reflect
- the actual ECHOmail name or conference tag used for the specified area.
- The CONFERENCE NAME may be up to 54 characters and must not contain any
- spaces; when creating a new ECHOmail conference, it is suggested your
- CONFERENCE TAG should not exceed 16 characters if at all possible to
- maintain compatibility with other systems.
-
-
-
-
- ECHOMAIL ORIGIN LINE
-
- Origin line: GNancy's BBS - Middletown, Ohio H
-
- The ORIGIN LINE defaults from your SYSTEM NAME (specified on the BASIC
- CONFIGURATION screen) and will be added to the bottom of all ECHOmail
- messages originating from your system. Typically, sysops use the name
- of their system and the city where it is located.
-
-
-
-
- ECHOMAIL ALIAS ADDRESS
-
- Alias address: G H
-
- If you are a member of more than one network, it might be necessary to
- use an "alias" address on an ECHOmail area. This means that the address
- put on the ORIGIN-LINE of the messages will be different than your pri-
- mary address.
- Most systems would leave this blank.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.16 ECHOMAIL AREAS
- 113
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ECHOMAIL TINY SEENBYS
-
- Tiny SEEN-BYs? GNo H
-
- If you say GYESH to TINY SEEN-BYs, then only the systems you are forwar-
- ding a conference to will appear on the SEEN-BY lines. This is fine if
- you are a "leaf node" or a local ECHO hub; GPLEASE NOTE THAT USING THISH
- GOPTION IS NOT ALLOWED IN SOME NETWORKS - CONTACT YOUR LOCAL ECHOMAILH
- GCOORDINATOR FOR MORE INFORMATIONH.
-
-
-
-
- ECHOMAIL DEFAULT PRIORITY
-
- Default priority: GNormal H (GIHmmediate/GCHrash/GNHormal/GHHold)
-
- For each conference, you specify a DEFAULT PRIORITY for forwarding of
- ECHOmail. Choose either GIMMEDIATEH, GCRASHH, GNORMALH or GHOLDH; This
- default may be overridden for any specific system.
-
-
-
-
- ECHOMAIL FORWARD TO
-
- Forward to: G1:110/68 22 .20 H
-
- The FORWARD TO fields allow you to specify a list of systems to whom you
- wish to forward this ECHOmail conference. You may specify as many systems
- as will fit on the 5 lines available; the systems should be separated by
- spaces and be in the format:
-
- GZONEH:GNETH/GNODEH[,GPRIORITYH] or .GPOINTH[,GPRIORITYH]
-
- Here's an example:
-
- G1:18/0 1:105/3 1:110/22,C .20,HH
-
- In this example, G1:110/22H has GCRASHH priority as an override and G.20H has
- GHOLDH priority specified. Please note that you may only forward ECHOmail to
- points or your own node. You may not send NETmail or ECHOmail directly to a
- point of another system.
-
- With this example, if I enter an ECHOmail message in this area, it will
- automatically be forwarded to these four systems, who will in turn send my
- message on to all the other systems participating in the conference.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.17 WINDOW COLORS
- 114
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.17 WINDOW COLORS
-
-
- The GWINDOW COLORSH screen allows you to set the screen colors that D'Bridge
- will use.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.18 KEYBOARD MACROS
- 115
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.18 KEYBOARD MACROS
-
- The GKEYBOARD MACROSH option allows the operator to define "macros" that
- cause keys, ALT F1-F10 and CONTROL F1-F10, to substitute preprogrammed
- text while editing. This might be handy for "canned" introductions,
- signatures or whatever you can think of. Twenty keys may be defined and
- each key can have any amount of text desired. Note: This limit is RAM-
- based, so check your memory status if in question.
-
- The cursor will appear on the top line. Fields may be changed by typing
- over the current values or by using the field edit keys: INSERT, DELETE,
- LEFT and RIGHT arrows. Pressing ENTER or the DOWN arrow advances to the
- next line and pressing the UP arrow moves the cursor to the previous
- line. You must press the ESC key to exit this window and save the setup.
- The above example shows the definition for the CONTROL-F1 key as being
- my mailing address. Each key is defined in its own window. All vertical
- pipe characters "|" are translated to hard-returns in the editor.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 3.19 TRANSLATION TABLE
- 116
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 3.19 TRANSLATION TABLE
-
- The GTRANSLATION TABLEH screen allows you to redefine how certain characters
- will be displayed. This may be used to allow line-drawing or foreign
- character sets to be used in the internal message editor. The ALT-keys
- (a-z) may be defined as displaying any character and transmitting it as a
- normal printable character in the range of 33-126.
-
- This is an advanced option and is not normally needed, so if you have no
- need for foreign character sets, skip this screen.
-
- It allows you to redefine part of the printable character set as translating
- to non-standard characters. Pressing the GLEFTH and GRIGHTH arrow keys scans
- through the characters, helping you to locate the proper ASCII code.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 117
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 4.00 SYSTEM IDLE COMMANDS
-
- When D'Bridge is idle, you have full control over its functions. The
- following single-key commands are available when the word "GIDLEH" appears
- in the upper-left corner of the screen:
-
- GCHall Makes the next outbound call immediately, if any
- GRHetry Retries the last outbound call, if any
- GNHext Advances the pointer to the next outbound call
- GPHrev Returns the pointer to the previous outbound call
- GHHold Places the queue entry selected on hold status
- GQHuickDial Activates QuickDial mode; no pause between calls
- GESCH Displays the main menu
- GF1H Activates the Help system
- GALT-CH Call a system from the nodelist in terminal mode
- GALT-DH Call a system from your directory in terminal mode
- GALT-EH Read/Edit EMAIL messages
- GALT-FH Request file(s)
- GALT-HH History display
- GALT-IH Information display
- GALT-KH KatGuard (electronic keyboard cover)
- GALT-LH View system log file
- GALT-NH New ECHOmail link
- GALT-PH Poll a node
- GALT-QH Rebuild outbound queue
- GALT-RH Request ECHOmail link
- GALT-SH Toggle display of the schedule window
- GALT-TH Transmit file(s)
- GALT-VH View/Modify queue
- GALT-XH Exit D'Bridge (Quit)
- GALT-YH Push to DOS shell (small)
- GALT-ZH Drop to DOS shell (large)
-
-
-
-
- HOLD ALL MAIL
-
- Selecting the GHOLD ALL MAILH menu option will immediately place all outbound
- mail on HOLD. The hold will come off at midnight, when a new event starts or
- by using the GVIEW/MODIFY QUEUEH command, GALT-VH.
-
- This command only holds mail until midnight at the latest.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 118
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- VIEW MODIFY QUEUE
-
- Selecting the GVIEW MODIFY QUEUEH option (or pressing ALT-V from IDLE mode)
- allows you direct access to the outbound mail queue allowing you to view,
- erase or change priorities of queue entries.
-
- The top line of the queue should be highlighted. To view or change a queue
- item, first move the highlight bar to the desired entry using the GUPH and
- GDOWNH arrows. Next select one of the following commands by pressing the
- first letter of the option (I for Immediate, etc.)
-
-
- GQUEUE: NHext, GPHrevious, GIHmmediate, GSHend, GHHold, GRHeset, GFHorce, GVHiew, GKHill
-
-
-
- GNEXTH The NEXT option advances to the next outbound call.
-
-
- GPREVIOUSH The PREVIOUS option returns to the previous outbound call.
-
-
- GIMMEDIATEH The IMMEDIATE option will change the priority of an
- entire queue entry to immediate until the next NETmail
- scan. If the queue entry is FORCED or is a unlisted
- system, this option is not valid and the computer will
- sound the "foghorn".
-
-
- GSENDH The SEND option will change the priority of an entire
- queue entry to crash priority. This change only lasts
- until the next NETmail scan. If the queue entry is
- FORCED or unlisted, the computer will sound the "foghorn".
-
-
- GHOLDH The HOLD option causes an entire queue entry to be held
- and not transmitted unless the receiving system poll for
- it. This option is not valid if there is a FORCED
- PRIORITY for the system.
-
-
- GRESETH When you RESET LIMITS for a queue entry, both the number
- of TRIES and CONNECTS is reset to zero, allowing the
- queue entry to be transmitted during this event even if
- the retries limit has been exceeded.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 119
- --------------------------------------------------------------------------------G
-
-
-
-
-
- GFORCEH When you FORCE a priority for a certain system, that
- system will be forced to that priority "until further
- notice". The only way to override the FORCE is to remove
- it by specifying "NONE" here. When you press "F" for
- FORCE, a menu is displayed:
-
- GFORCED MODE: IHmmediate, GCHrash, GHHold or GNHone
-
- Choose which priority to force this system to; if you don't
- want to do this, just press ESC and no change will be
- made. Select the priority or "N" to remove the "force".
- When a node is forced, it is designated by an exclamation
- point "!" next to the address.
-
-
- GVIEWH Viewing a queue entry lets you "look inside" a queue entry
- and see which messages and files are queued to send. Some
- general information about a system is displayed on the
- left; on the right is a detail window which may be scrolled
- up and down by using the UP, DOWN, PGUP and PGDN keys. Press
- ESC to exit view mode.
-
-
- GKILLH KILL is a very dangerous option because it allows you to
- erase any or all outbound mail and requests with one extra
- keystroke. Pressing "K" will display a window asking what
- you would like to KILL. If you don't want to KILL any
- part of the entry, press ESC to cancel. Otherwise, choose
- from the menu which lets you erase everything or just one
- "part" of the queued entry. You'll have to try it to really
- understand - just be careful.
-
-
- When you are finished VIEWING and MODIFYING the queue, just press ESC
- to exit this screen.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 120
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- REBUILD QUEUE
-
- The GREBUILD QUEUEH option causes D'Bridge to erase all the packets
- currently in the QUEUE window and re-scan for outbound mail.
- This is the same thing that happens when D'Bridge begins a mail event.
- This is handy for recreating packets if you had previously aborted the
- scan when D'Bridge first came up or you entered some messages in the
- editor (although there IS an option to automatically re-scan NETmail after
- leaving the editor).
-
- GREBUILD QUEUEH will normally create packets for all outbound mail
- regardless of whether it is CRASH priority or not; typically, all crash-
- mail will be sent, and all other mail will be on hold. This can easily
- be changed by using the GVIEW/MODIFY QUEUEH command, GALT-VH.
-
-
-
-
- POLL A NODE
-
- The GPOLL A NODEH option causes D'Bridge to call the specified system to
- pick up mail which may be on "hold" there. D'Bridge will simply ask you
- "Poll whom?" and you enter either the address of the system to call or the
- operator's name. If you enter a name, it will display a list of all systems
- with the Operator name you specify (if you enter "JOE," it will display all
- the "JOEs" in your nodelist and allow you to select the one you wish.
-
- If you don't know the address, five function keys (GF1H-GF5H) will aid you in
- your search. Once you have determined the system to call and pressed ENTER,
- D'Bridge will add a POLL entry to the queue with the specified priority.
- If you use IMMEDIATE or CRASH priority, the POLL will happen right away.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 121
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TRANSMIT FILES
-
- The GTRANSMIT FILE(S)H option gives you a simple and quick way to send
- files to another system. Any file which can be copied using the DOS
- "COPY" command can be sent with D'Bridge. Similar to the GPOLL A NODEH
- command, the GTRANSMIT FILE(S)H option asks you for the destination
- address. Here, you may enter the address of the system or part of the
- operator's name. Once you've entered the address, D'Bridge will ask
- you for a list of files to transmit. You may enter as many files as
- you wish, one per line. Make sure you've included the DOS subdirectory
- if they aren't in the current directory. If D'Bridge can't find a file,
- the cursor will simply be stuck on the line until you press ESC (to
- cancel the entire request), press the UP arrow or enter a valid (exis-
- ting) DOS filename. When you're satisfied you've entered the list cor-
- rectly, press ENTER. You may also use the DOS "wildcard" characters "*"
- and "?" to specify a group of files to send.
-
- To use a priority other than the default, enter <GFILENAMEH> <GPRIORITYH>
- in the window:
-
- GC:\AUTOEXEC.BAT ImmediateH
- GC:\DATA\BIGFILE.ZIP HoldH
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 122
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FILE REQUEST
-
- The GFILE REQUESTH option allows you to request that a remote system sends
- you file(s). With a network of all D'Bridge systems, all file requests
- are really update requests. This means that if you already have a file
- and you re-request it, it will only be sent if the file size or date/time
- are different.
- To use the FILE-REQUEST option, simply enter the address of the system you
- wish to call (just like MANUAL POLL and TRANSMIT FILE(S)) and enter a list
- of files you wish to receive.
-
- If you're not sure of the exact filenames, you may use the DOS "wild-
- card" characters "*" and "?." After you have entered the entire list of
- files to request, press ENTER and D'Bridge will add the request to the
- outbound mail queue.
-
- To use a priority other than the default or file-request passwords, use:
-
- <GFILENAMEH>[,<GPASSWORDH>] <GPRIORITYH>
-
-
- GFILE1,SECRET ImmediateH
- GFILE2 CrashH
-
- Note that HOLD is not a valid priority for file-requests. Requests only
- work when you call the remote system.
-
-
-
-
- INFORMATION DISPLAY
-
- The GINFORMATION DISPLAYH screens provide summary information about D'Bridge.
- Execution times and traffic-volume information are collected and available for
- display in three different forms:
-
-
- GSUMMARYH This provides traffic and data volumes for the year, month,
- week, yesterday and today.
-
- GTIME USAGEH History of execution times is displayed on this screen.
-
- GACTIVITY GRAPHH This shows a graphical representation of the operation
- of D'Bridge.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 123
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- READ / EDIT EMAIL
-
- The GREAD/EDIT EMAILH option causes D'Bridge to load the selected EMAIL
- editor. The screen will clear and the editor will be loaded, ready for you
- to read and respond to EMAIL messages.
-
- GDB EDITH may also be run directly from the dos prompt; it is used to enter
- and read the EMAIL messages D'Bridge sends and receives. D'Bridge utilizes
- the Fidonet standard message format used by so many other EMAIL systems,
- bulletin boards and utilities. This will allow you to use a great variety
- of external programs such as "robot" mailers, form-letter generators and
- editors.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 124
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- HISTORY DISPLAY
-
- When you select the GHISTORY DISPLAYH option, GALT-HH, you will receive
- a menu of available history screens. There are four screens on the menu:
-
-
- GOUTBOUND HISTORYH
-
- The outbound history screen simply displays a log of all outbound mail
- calls within the last "n" days (specified on the BASIC CONFIGURATION
- screen). This display always starts at the end by showing you the most
- recent call. The GUPH, GDOWNH, GPGUPH and GPGDNH keys scroll the screen, GESCH
- exits. This display lists the date, time, destination, bytes sent/received,
- elapsed time and actual cost of the connection.
-
-
- GINBOUND HISTORYH
-
- The inbound history screen simply displays a log of all incoming mail
- calls within the last "n" days. This display lists the date, time,
- origin, bytes sent/received, elapsed time. Since this is inbound mail,
- there is no cost involved.
-
-
- GRECEIVED ECHOMAIL HISTORYH
-
- The received ECHOmail history screen displays a log of all ECHOmail
- messages received within the last "n" days. This display lists the
- date, time, destination, bytes sent/received, elapsed time and actual
- cost of the connection.
-
-
- GAREAFIX LOGH
-
- The AREAFIX log screen displays a log of all automatic additions to
- your "forward-to" list in the area manager. These may be in the form
- of AREAFIX requests or may be entered manually by using the GNEWH
- GECHOMAIL LINKH, GALT-NH option.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 125
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- VIEW SYSTEM LOG
-
- The GVIEW SYSTEM LOGH command allows you to scroll through the system log file
- and search it for keywords. Besides the standard cursor control keys, the
- following keys are active here:
-
-
- G+H/G-H The GPLUSH and GMINUSH keys change the date of
- the display (pressing the minus key three
- times displays the log from 3 days ago.)
-
-
- GMHorning Displays log entries starting at midnight.
-
- GAHfternoon Displays log entries starting at noon.
-
- GEHvening Displays log entries starting at 6:00 PM.
-
- GSHearch Enters "search mode"
-
- GHHighlight Allows entry of highlight keywords and colors.
-
-
-
-
- GUSING SEARCH MODEH
-
- Search mode has two ways to look for log entries:
-
-
- GKEYWORD SEARCHH Searches for any match in a list of keywords.
-
- GTEXT SEARCHH Searches for the first occurrence of a substring.
-
-
- The GNHext and GPHrevious commands actually invoke the search.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 126
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- REQUEST ECHOMAIL LINK
-
- AREAFIX is a subsystem within D'Bridge enabling you to remotely
- request new ECHOmail links from a HOST or FEED system. This system,
- designed by Greg Dawson, eliminates the need for manual intervention
- on the part of the HOST system operator. Now that handling hundreds
- of ECHOmail conferences on a single system is a daily reality, this
- automated system of forwarding maintenance is required.
-
- The GREQUEST ECHOMAIL LINKH, GALT-RH command allows you to request a
- remote system, either STARTs or STOPs forwarding of ECHOmail conferences.
- To use this feature, you must pre-arrange a PASSWORD with the operator
- of your ECHOmail feed.
-
- First, enter the address of the system to request ECHOmail from. If you
- have not established an AREAFIX password for the specified system,
- D'Bridge will ask you to assign one at this time. AREAFIX will not
- function without a security password (for good reason!). AREAFIX pass-
- words may also be entered on the PACKET/MAIL CONTROL screen.
-
- Next, enter a list of CONFERENCE TAGS desired, one per line; press
- ENTER on a blank line when finished. If you wish to remove a conference
- rather than adding it, simply put a minus sign "-" before the tag.
-
- If you wish to receive a list of available ECHOmail from your ECHO link,
- answer YES to "Area listing?". If you want the host system to rescan the
- message base, sending you all the old messages, answer YES to "Get old
- messages?".
-
- Finally, choose the EMAIL priority you wish to use for transmitting the
- request. This priority has no connection to the one with which you will
- receive the ECHOmail - that's up to the other system's operator.
-
- When the request is received by the remote system, it will add or remove
- your system from its "forward-to" list as you have specified; it will
- send you a confirmation message which will explain the changes made and
- errors or violations you have made. This message may be sent automatical-
- ly, or you may have to poll later to receive it; this depends on how your
- ECHOmail link has his system configured.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 127
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NEW ECHOMAIL LINK
-
- The GNEW ECHOMAIL LINKH, GALT-NH command allows you to add systems to the
- FORWARD-TO list in your area manager. This command queues up the same
- type of entry as an inbound AREAFIX request with the exception of the
- security check. When a system is added or removed from an area, an
- audit trail is created in the AREAFIX LOG and a confirmation message
- is created and sent to the receiving system.
-
- First, enter the address of the system to send the ECHOmail conference(s)
- to. You do not have to have an AREAFIX password just to enter a manual
- request.
-
- Next, enter a list of CONFERENCES to add or remove, one per line; press
- ENTER on a blank line when finished. If you wish to remove a conference
- rather than adding one, simply put a minus sign "-" before the tag.
-
- If you wish to have D'Bridge rescan the entire ECHOmail area and send all
- the mail currently stored, answer YES to "Rescan?". If you wish to send a
- list of areas available, answer YES to "Send area list?".
-
- Choose the EMAIL priority you wish to use to transmit the request.
- This priority has no connection to the one with which you will receive
- the ECHOmail - that's up to the other system's operator.
-
- Finally, if you want the request to be processed immediately, answer
- YES to "Process now?". If the request is not processed immediately,
- you may enter several requests and subsequently run the PROCESS ECHOMAIL
- option on the UTILITIES menu.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 128
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TERMINAL EMULATOR
-
-
-
- The D'Bridge terminal mode is designed to let you communicate with
- online services such as a bulletin board system (BBS), CompuServe<TM>
- and other such electronic information systems. Terminal mode acts
- like a glass Teletype, having an 24x80 display plus a status line
- giving information such as current baud rate, parity, etc. It is not
- the intention of D'Bridge to provide many terminal features such as you
- might find in other communication programs; D'Bridge is an EMAIL system
- and only provides this terminal mode as a simple means for you to tie-
- in with other systems through a direct connection.
-
-
- Terminal mode transmits all printable and control characters without
- translation to your modem. The ALT keys are used to control the various
- functions in terminal mode. Pressing ALT-X exits the terminal and
- returns to mailer mode.
-
-
- Once in the terminal mode, you will notice that pressing ALT-H displays
- a help screen. These are the commands currently supported:
-
-
-
-
- /-TERMINAL MODE COMMANDS----------------\
- | |
- | ALT-C Dial system(s) from nodelist |
- | ALT-D Dial system(s) from directory |
- | ALT-P Set terminal parameters |
- | ALT-L Capture log ON/OFF |
- | ALT-T Terminate connection |
- | ALT-W Wipe (clear) screen |
- | ALT-X Exit terminal mode |
- | ALT-Y PUSH to DOS |
- | ALT-Z DROP to DOS |
- | PgUp Upload file(s) |
- | Pgdn Download file(s) |
- | |
- \---------------------------------------/
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 129
- --------------------------------------------------------------------------------G
-
-
-
-
- GALT-C / Call system from nodelistH
-
-
- D'Bridge can dial any systems in your nodelist that are not "unlisted
- nodes". Pressing ALT-C will display the following window:
-
-
- /-CALL SYSTEM(S) FROM NODELIST--------------------------------------------\
- | |
- | F1-List nodes in NET 1:110 |
- | F2-Change ZONE:NET |
- | F3-List all NETS |
- | F4-List NETS in ZONE 1 |
- | Dial which node(s)? F5-Scan user names |
- | |
- | _____________________________________________________________________ |
- | |
- \-------------------------------------------------------------------------/
-
-
- Simply enter a list of addresses you wish to call, separated by spaces.
- D'Bridge will auto-dial the entire list until a connection is made. The
- function keys F3-F7 are available to assist you in locating the proper
- addresses. When a connection has been made, D'Bridge will "beep" and
- return to terminal mode with the remote system online at the proper
- baud rate.
-
-
- GF3H Scans the entire nodelist by username (first names).
-
- GF4H Pressing the F3 key displays all the NODES and POINTS in the
- currently selected NET. Pressing ENTER while using this display
- selects a system; pressing ESC cancels.
-
- GF5H Gives a listing of all NETs in the entire nodelist and allows
- you to select a new NET.
-
- GF6H Lists all ZONEs in the nodelist
-
- GF7H Allows you to change the currently selected NET by entering the
- ZONE:NET desired. After you change NETs, you can use the F1 key
- to list the systems in the new NET.
-
- GENTERH Starts the cycle-dialing window; D'Bridge will continue dialing
- until connected or interrupted by the operator.
-
- GESCH Cancels dialing mode
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 130
- --------------------------------------------------------------------------------G
-
-
-
-
- GALT-D / Dialing directoryH
-
- D'Bridge terminal mode has a built-in dialing directory enabling you
- to program the phone numbers for up to 100 systems you call frequently.
- Pressing ALT-D will display the following window:
-
-
-
- /-DIALING DIRECTORY---------------------------------------------------------\
- | Entry Name Phone number Baud/Parms |
- | ----- ---- ------------ ---------- |
- | 1 D'Bridge Support/Cincinn 1-513-821-1387 9600 8N1 |
- | 2 D'Bridge Support/West 1-503-292-7233 9600 8N1 |
- | 3 D'Bridge Support/West 1-503-292-7237 9600 8N1 |
- | 4 D'Bridge Support/East 1-215-879-3310 9600 8N1 |
- | 5 D'Bridge Support/Canada 1-416-823-4521 9600 8N1 |
- | 6 D'Bridge Support/Europe 31-85-459034 2400 8N1 |
- | 7 D'Bridge Support/Italy 39-766-540-899 2400 8N1 |
- | 8 D'Bridge Support/Austral 61-3-848-3331 9600 8N1 |
- | 9 D'Bridge Support/Austral 61-3-563-2496 9600 8N1 |
- | 10 |
- | 11 |
- | 12 |
- | |
- | Edit entry, Delete entry, UP, DOWN, PGUP, PGDN, #, ENTER-Dial, ESC-Cancel |
- | |
- | Command? |
- \---------------------------------------------------------------------------/
-
-
- You may easily enter or change numbers in this list by using the EDIT
- ENTRY command. Move the highlight bar to the entry you wish to add or
- edit then press "E". It will display the following window:
-
-
- /-EDIT DIRECTORY ENTRY---------------------\
- | |
- | Entry number: 1 |
- | Name: D'Bridge Support/Cincinn |
- | Phone number: 1-513-821-1387 |
- | Baud rate: 9600 |
- | Parity: NONE |
- | Data bits: 8 |
- | Stop bits: 1 |
- | Save entry? |
- | |
- \------------------------------------------/
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 131
- --------------------------------------------------------------------------------G
-
-
-
- Enter the NAME, PHONE NUMBER, BAUD RATE, PARITY, DATA BITS and STOP BITS
- desired, then answer YES for "Save entry?". Pressing ESC will abort the
- change. After you have answered YES, the window will disappear and the
- entry will be permanently added to your personal dialing directory.
-
- To dial a number, simply type the ENTRY NUMBERS desired, separated by
- spaces, then press ENTER. You can also move the highlight bar to the
- desired line and press ENTER. Either will do the same thing.
-
- If you wish to use the D'Bridge scripting language, simply enter the
- phone number with the following format:
-
- "SCRIPT.FIL"aaa-nnn-nnnn
-
- Where SCRIPT.FIL is the name of your script file, aaa is the AREA CODE
- you are calling and nnn-nnnn is the PHONE NUMBER.
-
-
-
- GALT-H / Terminate connectionH
-
-
- Pressing ALT-H will terminate the current call immediately by dropping
- the DTR signal to the modem for 1.2 seconds.
-
-
-
- GALT-P / Set terminal parametersH
-
- The ALT-P command will allow you to set the default settings for
- terminal mode. Pressing ALT-P displays the following window:
-
-
-
- /-SET TERMINAL PARAMETERS--\
- | |
- | Comm port: COM1 |
- | Baud rate: 2400 |
- | Parity: NONE |
- | Data bits: 8 |
- | Stop bits: 1 |
- | Duplex: FULL |
- | Emulation: ANSI |
- | Capture ANSI: YES |
- | AutoDownload: YES |
- | |
- \--SPACE-Change, ESC-Exit--/
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 132
- --------------------------------------------------------------------------------G
-
-
-
-
-
- By using the UP and DOWN arrow keys to select an option and pressing
- the SPACE bar to change, you can configure the terminal to any setting
- you wish. This setting will be recalled when terminal mode is entered,
- but the communications settings can also be changed by ALT-C and ALT-D.
-
-
-
- GCOMM PORTH
-
- The COMM PORT specifies which serial interface channel you wish to
- use. This could allow you to select between modems or even direct
- links to other PC's. COM1 through COM7 are allowable values.
-
-
- GBAUD RATEH
-
- This allows you to select the speed or BAUD RATE of the serial link with
- your modem. Allowable values are 300, 1200, 2400, 4800, 9600, 19200 and
- 38400, but may not exceed the value specified in the COMMUNICATIONS/MODEM
- SETUP screen. If you have LOCKED your modem at its top speed, this baud
- rate setting has no effect.
-
-
- GPARITYH
-
- The PARITY setting allows you to communicate with systems that require
- parity-error checking. Valid settings are NONE, EVEN, ODD, MARK and SPACE,
- but most newer networks are using "NONE."
-
-
- GDATA BITSH
-
- This setting is included for compatibility with old-style 7-bit systems.
- Allowable values are 7 and 8, but be warned file-transfers will not
- function properly with a 7-bit link.
-
-
- GSTOP BITSH
-
- Almost all baud rates use 1 stop bit, but "weird" configurations might
- require a value of 2 (highly unlikely!).
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 133
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- GDUPLEXH
-
- Some older systems require your own system to provide the "echo" of
- the characters typed. This is called HALF DUPLEX. Newer systems all
- echo back the characters you type, eliminating the need for a HALF
- DUPLEX setting. Use FULL DUPLEX for systems such as CompuServe, The
- Source and BBS networks.
-
-
- GEMULATIONH
-
- D'Bridge terminal program has only one emulation, ANSI. You may either
- select ANSI or NONE. The ANSI emulation does not require the use of
- an ANSI.SYS driver; it includes full color support plus ANSI-MUSIC!
-
-
- GCAPTURE ANSIH
-
- If you have the capture log enabled, D'Bridge has the option to either
- save or strip the ANSI codes from the file. If you want to SAVE the
- ANSI codes in the capture file, answer YES here.
-
-
- GAUTODOWNLOADH
-
- D'Bridge terminal mode has the capability to detect when the remote
- system has initiated a ZMODEM send request. If you answer YES to this
- question, when such a request is detected, D'Bridge automatically starts
- a ZMODEM receive session saving you the trouble.
-
-
-
- GALT-L / Capture log ON/OFFH
-
- The ALT-L key "toggles" the capture log ON or OFF. If you wish every-
- thing displayed on the screen to be captured to a text file, press
- ALT-L to turn on the capture log. It will ask you for a DOS filename
- to store the information in; it defaults to CAPTURE.LOG, but you may
- change it to any directory or filename you wish. Pressing ALT-L a
- second time or exiting terminal mode will close the text file. If a
- capture file already exists, D'Bridge will add on to the end of it,
- preserving its previous contents.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 134
- --------------------------------------------------------------------------------G
-
-
-
-
- GALT-W / Wipe (clear) screenH
-
-
- Pressing ALT-W simply clears the current screen, moving the cursor to
- the upper-right corner.
-
-
- GALT-X / Exit terminal modeH
-
- Pressing ALT-X will take you out of the terminal mode and back to
- D'Bridge. Your modem will be re-initialized and should be ready
- to receive incoming mail almost immediately.
-
-
- GALT-Y / PUSH to DOSH
-
- Pressing ALT-Y will allow you access to DOS commands while you are
- still connected to a remote system. To get back into D'Bridge, type
- EXIT. This is handy for doing directory listings, etc. while you're
- connected to an online service.
-
-
- GALT-Z / DROP to DOSH
-
- Pressing ALT-Z will also allow you access to DOS commands. The only
- difference is that with ALT-Z, D'Bridge is totally swapped out of memory
- to EMS or disk so you have as much free memory as possible.
-
-
- GPgUp / UploadH
-
- The PgUp key allows you to transmit a list of files to the host
- computer. The way to do this is typically to tell the remote computer
- you are ready to send some files, then press the PgUp button, select
- the desired protocol, XMODEM, Telink or ZMODEM, then enter a list of
- files to send. Note: With XMODEM, you can only send one file at a
- time - XMODEM is not a "batch" protocol.
-
-
- GPgDn / DownloadH
-
- The PgDn key allows you to receive files from the host computer. This
- is normally done by first telling the remote system which files to send
- then pressing the PgDn key. You then tell D'Bridge which protocol you
- want to use, XMODEM, Telink or ZMODEM and specify which directory to
- put the files in. With XMODEM you must specify the actual filename
- because it is not a batch protocol.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 135
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- BUILD NODELIST DATABASE
-
- This forces D'Bridge to recompile the nodelist database index. This is
- normally an automatic process happening at midnight, but you can force
- it to happen by selecting this option.
-
-
-
-
- PROCESS MAIL
-
- This enables you to manually start inbound mail processing and scanning
- for outbound ECHOmail and AREAFIX requests. This shouldn't be necessary
- unless you have mail processing set to "Manual" in the PACKET/MAIL CONTROL
- screen.
-
-
-
-
- FILEBASE SEARCH
-
- This option (GCTL-FH) allows you to search through the D'Bridge FileBase
- for a partial match on a specified filespec.
-
- The FileBase is a combined listing of files available for request on other
- systems. This enables you to easily locate files and request them with the
- ease of point-and-shoot operation.
-
- After you specify a search key to start (like "DB" for filenames starting
- with DB), a list of partial matches will be displayed. You can highlight the
- file you want to request by using the arrow keys; request it by pressing "R",
- then the priority: GImmediateH, GCrashH, or GNormalH.
-
- If you need to make a passworded request, set the current password with the
- "GPH" option. Since the FileBase is not zone-aware, you may select another
- zone with the "GZH" option.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 136
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- LICENSE REGISTRATION
-
- D'Bridge requires a registered license key be used in accordance with our
- software license policy. This registraion process will allow you to be added
- to our mailing list and at the same time request that a new license key file,
- customized with YOUR name or handle will be created for you within ten days.
-
- Complete the registration form, send it in, then look for "GNEWKEY.ZIPH" to
- arrive about ten days after your registration was sent.
-
- If you have more than one license key to register, put them all in a directory
- and specify it in the registration screen.
-
-
-
-
- EXPORT CONFIGURATION
-
- With this option, D'Bridge will produce an "exported configuration" file.
- Normally called GDBRIDGE.CFGH, the output is a standard text file designed
- to transfer the entire D'Bridge parameter configuration to another system or
- for upgrading to a newer version.
-
- Every night at midnight, D'Bridge automatically exports its configuration to
- a file called GDBRIDGE.AUTH and puts it in an archive called GDBCONFIG.ZIPH.
-
-
-
-
- LEAVE DBRIDGE
-
- This option, GCTL-CH or GALT-XH will exit to DOS and completely unload the
- D'Bridge software.
-
-
-
-
- DROP TO DOS
-
- This option or GALT-ZH will "drop" to DOS, creating the largest possible
- DOS shell using the secondary command processor specified by the environment
- variable "COMSPEC" (usually COMMAND.COM).
-
- D'Bridge swaps its memory either to EMS or disk, depending on free memory
- available.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 4.00 SYSTEM IDLE COMMANDS
- 137
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PUSH TO DOS
-
- This option or GALT-YH will "push" to DOS, creating a DOS shell using the
- secondary command processor specified by the environment variable "COMSPEC".
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 138
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 5.00 EMAIL MESSAGE EDITOR
-
- The EMAIL message editor is activated by selecting the READ/ENTER EMAIL
- option from the main menu or by pressing ALT-E. The editor may also be
- accessed directly from the DOS prompt by typing:
-
- C> DB EDIT
-
- Assuming the DB EDIT command was found, you quickly get a display
- similar to the following:
-
-
- F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu D'Bridge
- 1.30/001002
- /-READ/EDIT EMAIL-------------------------------------------------------------\
- |Msg # 250 |
- |Date: 11 Jun 92 18:10:34 |
- |From: Chris Irwin |
- | To: Tom Ordelman on 201:200/0 D'Bridge Support/Europe |
- |Subj: Greetings from freezing Cincinnati! |
- |-----------------------------------------------------------------------------|
- |Hello Tom, |
- | |
- |I was just writing to let you know that I've been sitting out in the snow |
- |finishing the D'Bridge documentation. I think that you will find that it |
- |is well-written and quite clear. It's Thursday, so I'll be out playing poker |
- |this evening... Give me a call when you get a chance tomorrow! |
- | |
- |Regards, |
- |Chris, 201:201/0 |
- | |
- | |
- | |
- | |
- \-----------------------------------------------------------------------------/
- Area: D'Bridge network mail Msgs: 273 Highest: 298 Last read: 276
-
-
- This is the "READ" mode of D'Bridge. Using this screen, you can enter,
- read and reply to messages along with a variety of utility functions.
- Each function will be described in detail in the next few sections.
- Remember that a quick way to get out of the editor is to press CONTROL-C.
- This is a perfectly acceptable way to get out, it's just like using
- the QUIT menu option.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 139
- --------------------------------------------------------------------------------G
-
-
-
-
-
- GRIGHT and LEFT arrows - NEXT and PREVIOUS MESSAGEH
-
- Pressing the RIGHT arrow key will display the next message in the
- current area; pressing the LEFT arrow will display the previous one.
-
-
- GF1 or E - ENTER A MESSAGEH
-
- As soon as you press the F1 key or the letter "E" D'Bridge will go into
- "EDIT" mode, clearing the screen and starting with a blank message.
-
-
- GF2, R, Q or > - REPLY TO A MESSAGEH
-
- Replying to a message is the same as entering a new one; the difference
- is that the "TO" name and address is taken automatically from the
- message currently on the screen. The editor will move the "FROM" infor-
- mation to the "TO" field. This is handy to keep from making a mistake
- typing the name or network address. There are four keys that create a
- reply message:
-
- GF2H Asks for QUOTED or NORMAL reply.
- GRH Creates a NORMAL reply.
- GQH Creates a QUOTED reply.
- G>H Same as Q.
-
- If you select a NORMAL reply, the screen will clear and just the "TO"
- and "FROM" information will be displayed. If you specify a QUOTED re-
- ply, the entire message you are replying to will be QUOTED, so that
- you may remind who you are communicating with and exactly what it is
- you are replying to. QUOTED text has each line starting with a ">"
- character indicating that the text came from the other person.
- For example, if a message reads:
-
-
- What time can I call you about the pricing information?
-
-
- Your QUOTED reply might look like:
-
-
- CI> What time can I call you about the pricing information?
-
- Give me a call around 4:00, if I'm not in, please leave the
- information with my secretary.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 140
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- QUOTED replies are quite valuable for reminding the receiver exactly
- what you're talking about. In fact, if the receiver of the above message
- wanted to reply to you, the reply might look like:
-
-
- CI> What time can I call you about the pricing information?
-
- TO> Give me a call around 4:00, if I'm not in, please leave the
- TO> information with my secretary.
-
- I can't - I'm flying to Paris today. I'll call you when I
- get back.
-
-
-
- GF3 or O - EDIT AN OLD MESSAGEH
-
- Sometimes, you will enter a message, then realize you wish to make a
- change before sending it. The F3 or "O" option does just that. It
- allows you to edit the currently displayed message. If the message
- displayed is not from you, you will be asked "You didn't enter this
- message, edit anyway?". Generally, it's not "nice" to edit other
- people's mail, but D'Bridge allows you to do this anyway.
-
-
- GF4 or L - LIST MESSAGESH
-
- Pressing F4 or "L" will put the editor into "LIST" mode. While in
- "LIST" mode, the display changes to show you all the message headers.
- This is handy when you want to scan for a particular message quickly.
- Until you press the ESC key, the editor will remain in LIST mode and
- the function keys have a different meaning. While in this mode, you
- may view message headers and select a group of messages to KILL or
- PRINT.
-
-
- LIST: Include, Exclude, All, None, Page, Display, Group, ESC-Exit D'Bridge
- 1.50/001002
- /-READ/EDIT EMAIL-------------------------------------------------------------\
- |/-LIST MESSAGES--------------------------------------------------------------\
- ||Msg # Date From To Subject |
- || 292 20 Apr Chris Irwin Tom Ordelman 201:200/0 D'Bridge Suppor|
- || 293 20 Apr Chris Irwin Joaquim Homri 135/20 Re: ZMODEM |
- || 294 20 Apr ARCmail Sysop 107/246 FF239209.MO1 |
- || 295 20 Apr ARCmail Sysop 108/871 F98429E1.MO1 |
- || 296 20 Apr ML-UPD 1.5 11/109 Megalist Admi 000B0071.MLA |
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 141
- --------------------------------------------------------------------------------G
-
-
-
-
- The first line will be highlighted with a light bar. Using the UP, DOWN,
- PGUP and PGDN keys, you can move the light bar to the desired message.
- When you press the ESC key, the specified message will be displayed and
- DBEDIT will return to READ mode.
-
-
- While the LIST window is on the screen, the following commands are
- enabled:
-
-
- GI - INCLUDEH
-
- When you press the I key, a star ( * ) will appear next to the
- message number on the highlighted line. This means this message
- is "included" for processing by group commands.
-
-
- GE - EXCLUDEH
-
- Pressing the E key will remove a star "*" from the highlighted
- line. This is used to un-include (de-select) the current message
- from processing by the group commands.
-
-
- GA - ALLH
-
- If you press A, all of the messages will be included for processing
- by group commands and they will all have a star "*" next to them.
- This is handy to use in conjunction with "E" (EXCLUDE) when you
- want to process most of the messages with group commands.
-
-
- GN - NONEH
-
- Pressing N will remove all the stars "*" from the LIST MESSAGES
- window. None of the messages will be selected for group commands.
-
-
- GP - PAGEH
-
- Pressing P will select all messages on the currently displayed page.
-
-
- GD - DISPLAYH
-
- Pressing D will toggle the LIST display between showing the TO, FROM
- and SUBJECT and showing the entire SUBJECT line.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 142
- --------------------------------------------------------------------------------G
-
-
-
-
- GG - GROUPH
-
- Pressing G will display another list of options called GROUP COM-
- MANDS. With these commands, you can PRINT or KILL all of the
- selected messages automatically. This can be a very "dangerous"
- command, so make sure you know exactly what you're doing if you
- use it. The following GROUP COMMANDS are allowed:
-
-
- GP - PRINT (group command)H
-
- The P group command will PRINT all messages that have stars "*"
- next to them and were previously included while in the "LIST"
- mode. Obviously this option will work only if you have a printer
- connected; press the ESC key to cancel the PRINT operation.
-
-
- GK - KILL (group command)H
-
- The Kill group command will KILL all messages that were included
- and have a star "*" next to them. Make sure you have double-
- checked which messages were included because once they are
- KILLED, they are permanently gone. (Perhaps Professor Norton
- could get them back... ).
-
-
- GF5 or K - KILL A MESSAGEH
-
- Pressing F5 or "K" allows you to permanently KILL (erase) a message from
- your disk. It will ask you "ARE YOU SURE?" just in case you pressed it
- accidentally; use this option with caution!
-
-
- GF6 or A - CHANGE MESSAGE AREASH
-
- The editor allows you to have any number of local and ECHOmail areas.
- Pressing F6 or "A" will display a list of all the areas you have de-
- fined in your configuration. Select the desired area by moving the
- light bar up and down, then pressing ENTER when the desired area is
- highlighted. You may also enter the AREA NUMBER and press ENTER. Both
- ways accomplish the same thing. If you are running a basic EMAIL
- system, you probably will not have any use for this option.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.00 EMAIL MESSAGE EDITOR
- 143
- --------------------------------------------------------------------------------G
-
-
-
-
- GESC - EDITOR MENUH
-
- All of the other editor features are accessible by using the EDITOR
- MENU. Pressing ESC will display the menu and allow you to select any
- of the following options:
-
- - Area information
- - Display statistics
- - Forward message
- - Copy/move message
- - Print message
- - Write message to file
- - Username AKAs/Alias addresses
- - Search headers/text
- - PUSH/DROP to DOS
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 144
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 5.01 USING EDIT MODE
-
- After you have selected either the ENTER, REPLY or EDIT command, the
- editor will be in "EDIT" mode. When you are using this mode, all of the
- keys have different meanings than they do in READ mode. The top line of
- the screen lists all the valid commands.
-
- The cursor will first appear on the "TO" field. Here, you enter the
- name of the person to whom the message is addressed. If you have
- selected the USERNAME INDEX option (in the nodelist configuration),
- the editor scans for a username simply by entering part of the name.
- For example, if you enter "CHRIS", DBEDIT will display all of the
- users who have a first name of Chris, Christine, Christy or Christo-
- pher and allow you to select the desired person. This search is based
- on FIRST NAME, so entering a last name won't work.
-
- If you wish to send the same message/files to different destinations,
- press the F8 key while on the "TO" field. This will display a window
- which allows you to enter any number of destinations, one per line in
- the following form:
-
- <ADDRESS>[,<PRIORITY>] <USER NAME>
-
- ie.
-
- 1:110/68 Chris Irwin
-
- Valid priorities are: GHH - Hold
- GNH - Normal
- GCH - Crash
- GIH - Immediate
-
- If you routinely send information to the same list of systems, you
- will want to take advantage of the "distribution list" feature.
- Instead of an address and a username, you can specify the names of
- any number of distribution lists to include. A distribution list is
- simply a text file containing the same information as above: address
- and username.
-
- After you have entered or selected the name of the person you are
- writing the message to, the editor will say "on" and expect you to
- enter the address of the user. If you selected the username from the
- D'Bridge database, the address should already be there and you simply
- press ENTER. If you are entering this message to someone not in the
- database or have specified NO in the CREATE USERNAME INDEX field in
- the nodelist setup, you will need to enter the address.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 145
- --------------------------------------------------------------------------------G
-
-
-
-
-
- The editor provides 5 function keys to help you to find an address:
-
- GF3 - List nodesH
-
- Pressing F3 will display a list of all the systems in the currently
- selected ZONE:NET. Moving the light bar, highlight the desired system
- and press ENTER. If you can't find the address in this NET, press the
- ESC key.
-
- GF4 - Change netH
-
- The F4 key allows you to change the currently selected ZONE and NET
- numbers. Enter the ZONE and NET numbers desired separated by a colon
- ( : ) character. If you specify just one number, it is assumed to be
- the NET; the ZONE remains the same. After changing the ZONE and NET
- you may use the F3 key again to scan for individual systems.
-
- GF5 - List netsH
-
- Pressing F5 will give you a list of all ZONE and NET numbers in your
- nodelist and allow you to choose one as the currently selected NET.
- Similar to the F6 function, move the light bar to the desired line
- and press the ENTER key.
-
- GF6 - List zonesH
-
- This function is identical to F5 above except it lists the ZONES that
- are compiled into the nodelist.
-
- GF7 - Set ZONE:NETH
-
- Allows you to directly set the ZONE and NET defaults.
-
-
- After you have selected the destination address, the cursor will move to
- the SUBJECT line. If you want to send a file along with this message or
- if you wish to request one, you must enter the filename(s) as the sub-
- ject. If you are SENDING files, you must specify the actual filename
- including drive and directory. If you are requesting a file, just specify
- the filenames you wish to receive. Obviously, if you are neither SENDING
- nor REQUESTING files, the SUBJECT line is simply a field which briefly
- states the purpose of the message.
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 146
- --------------------------------------------------------------------------------G
-
-
-
- While the cursor is on the SUBJECT field, the following function keys are
- in effect:
-
- GF3 - Send fileH
-
- Pressing F3 sets the FILE-ATTACH attribute for the message. This means
- all the files listed in the SUBJECT line (labeled ENCL) will be sent
- with the message.
-
- GF4 - File requestH
-
- Pressing the F4 key sets the FILE-REQUEST attribute for the message.
- This means that when the message is sent, D'Bridge will request that
- the remote system sends you all the listed files.
-
- GF5 - Update requestH
-
- The F5 key sets the UPDATE-REQUEST attribute for the message. UPDATE-
- REQUESTS are the same as FILE-REQUESTS in D'Bridge.
-
- GF6 - CancelH
-
- Pressing F6 cancels a FILE-ATTACH, FILE-REQUEST or UPDATE-REQUEST and
- makes the SUBJECT line be just informational.
-
-
- When the cursor is BELOW the line separating the heading from the message
- text, the editor acts just like most word-processing systems.
- You may simply type in your message, using the BACKSPACE and ARROW keys
- to edit. You may notice that when you press the ENTER key, a "HARD RETURN
- SYMBOL" is generated. Normally, you should not press the ENTER key unless
- you wish to start a new paragraph or are entering a list of some kind
- which should not be "rejustified" on the receiving system. Because D'Bridge
- can communicate with other EMAIL systems and bulletin boards, the messages
- might not look exactly the same on the receiving system as they look on
- your screen when you enter them. For example, some EMAIL editors only
- allow the display of 66-column text. If you were to use HARD RETURNS (by
- pressing ENTER on each line), your message would be very hard to read on
- the other EMAIL system. Get in the habit of only pressing the ENTER key
- when you want to start a new paragraph.
-
- While in the "EDIT" mode, the following function keys are in effect:
-
- GF1 or ESC-Q-A - ABORTH
-
- If you have accidentally gone into "EDIT" mode or wish to cancel your
- edit session and completely "throw away" the message you are entering,
- use the ABORT option. The editor will ask "ARE YOU SURE?", just to
- make sure you didn't press F1 accidentally. ABORTING your editor will
- return you to "READ" mode.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 147
- --------------------------------------------------------------------------------G
-
-
-
-
- GF2 or ESC-Q-S - SAVE MESSAGEH
-
- Pressing F2 will immediately save the current message to disk. Unless
- otherwise specified, it will be sent during the next scheduled mail
- event. If you press F2 by accident, you can always use the EDIT OLD
- option to continue or change it. SAVING your message will return you
- to "READ" mode.
-
- GF3 or CONTROL-N - INSERT LINEH
-
- The INSERT LINE option will add a blank line BEFORE the line where the
- cursor is located.
-
- GF4 or CONTROL-Y - DELETE LINEH
-
- The DELETE LINE option does just that; it erases the line that the
- cursor is on.
-
- GF5/F6 - MARKH
-
- This is an "advanced" feature; The F5 key marks the beginning of a
- block of text; the F6 key marks the end. "Marked" text is designated
- by reverse video for the selected block. This is used in conjunction
- with the BLOCK commands described later; they allow you to COPY, MOVE,
- DELETE or WRITE the selected block of text to a file.
-
- GF10 - FLAGSH
-
- D'Bridge allows you to set up to 15 different "FLAGS" on an EMAIL
- message. Pressing F10 displays a menu of all the flags; only the
- ones that are "bright" are allowed. Depending on certain criteria,
- such as FAX addressing, etc, certain options are not always available.
- The currently defined flags are as follows:
-
-
- GPrivateH This message is intended for the addressee only.
- If the receiving system is a BBS, only the Sysop
- should be able to read the message.
-
- GHoldH HOLD priority should be used for this message.
- Please note that unless you specify XMAIL for this
- message, the message will be sent if there is any
- other outbound traffic for the destination system;
- if you enter a CRASH message to the same system,
- both messages will be sent unless you XMAIL it.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 148
- --------------------------------------------------------------------------------G
-
-
-
-
- GCrashH CRASH priority means the message should be sent
- right-away, even during the UNEVENT. Only messages
- with CRASH or IMMEDIATE priority will be sent during
- the UNEVENT. CRASH messages might cost more due to
- making a long-distance phone call during the day
- rather than during a late-night scheduled event.
- CRASH priority messages never get routed, but go
- directly to their destination.
-
- GImmediateH An IMMEDIATE priority message means the message will
- be sent right away and have priority over other out-
- bound traffic that has no IMMEDIATE priority.
- This is handy for getting an important message out
- when there's a lot of other outbound traffic in the
- queue.
-
- GXMailH If you specify an EMAIL message to be XMAIL, this
- means the D'Bridge mail scanner will pack the
- message in an outbound XMAIL archive using the
- specified archive program: ZIP, LHA, ARJ, PAK, ARC
- or ZOO. If you use this method, all priorities:
- IMMEDIATE, CRASH, NORMAL and HOLD are treated
- separately; HOLD mail will never be sent unless the
- other system calls to pick it up or the operator
- specifically overrides it in the VIEW/MODIFY QUEUE,
- ALT-V mode.
-
- GKill/SentH If a message has the KILL/SENT flag, it will be
- erased from your NETmail area as soon as it has been
- successfully transmitted. This is good for messages
- that have been sent to multiple destinations.
-
- GArchive/SentH The ARCHIVE/SENT flag causes a message to be written
- to the specified OUTBOUND MAIL ARCHIVE specified on
- the PACKET/MAIL CONTROL screen. After the message
- text has been stored in this file, the message is
- erased from the system.
-
- GDirectH If a message is flagged as DIRECT, the normal
- routing specified in the ADVANCED ROUTING screen of
- the event setup is ignored; the message is sent
- directly to its final destination.
-
- GUse ZonegateH If you wish an inter-zone message to be routed
- through the official "zonegate", use this flag.
-
- GRoute/HUBH If you want a message to be HOST- or HUB-ROUTED,
- specify this flag.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 149
- --------------------------------------------------------------------------------G
-
-
-
- You can change the flags either by moving the highlight bar with the
- UP and DOWN arrows and pressing ENTER, or by pressing the first letter
- of the desired flag. Press ESC when you are finished setting message
- flags.
-
-
- GESC - MENUH
-
- The rest of the "EDIT" mode commands are activated from the menu.
- Pressing the ESC key will display the menu.
-
-
- GBLOCK: READH
-
- The BLOCK READ option allows you to read in text from a standard text
- file. It will ask for the name of a text file and whether you want to
- use HARD of SOFT returns. If the text is in the form of paragraphs, use
- the SOFT option; if you are reading in columns of numbers or some sort
- of text you don't want to be reformatted, specify HARD.
-
- GBLOCK: WRITEH
-
- Assuming you have already used the F5 and F6 keys to highlight a
- block of text, the BLOCK WRITE option allows you to write it to a
- standard text file.
-
- GBLOCK: COPYH
-
- The BLOCK COPY option will move the text highlighted with the F5 and
- F6 keys to the position where the cursor is currently located. This
- option will not work if the cursor is within the highlighted region.
-
- GBLOCK: MOVEH
-
- The BLOCK MOVE option is the same as the BLOCK COPY command except
- the text is actually moved rather than copied to the current cursor
- position.
-
- GBLOCK: DELETEH
-
- The BLOCK DELETE command will erase all text you highlighted with
- the F5 and F6 keys.
-
- GQUIT: SAVEH
-
- The SAVE option is the same as the F2 key. It saves the current message
- and returns to "READ" mode.
-
- GQUIT: ABORTH
-
- The ABORT option allows you to "throw away" the current edit session.
- This is the same as the F1 key.
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.01 USING EDIT MODE
- 150
- --------------------------------------------------------------------------------G
-
-
-
-
- GQUIT: DROP TO DOSH
-
- The DROP TO DOS command allows you access to DOS while you are editing
- a message. This method frees all available memory by swapping the
- editor to EMS or disk. When you are finished using DOS commands or
- programs, type "EXIT" to return to your edit.
-
- GQUIT: PUSH TO DOSH
-
- The PUSH TO DOS command allows you access to DOS while you are editing
- a message. When you are finished using DOS commands or programs, simply
- type "EXIT" to return to the editor.
-
-
- To summarize, we have included the following table of keys and their
- effect in various "edit" modes:
-
-
- Mode/field Key(s) Effect
- -------------------------------------------------------------------
- G"TO" F3H List users starting with the one entered
- GF8H Multiple destinations/Distribution list(s)
-
- G"ADDRESS" F3H List all NODEs in the currently selected NET
- GF4H Select a new ZONE and NET
- GF5H List all NETs in the nodelist
- GF6H List all NETs in the selected ZONE
- GF7H List FAX entries
-
- G"SUBJECT" F3H Send file(s)
- GF4H File-request
- GF5H Update-request
- GF6H Cancel send/request
-
- GEDITOR UPH Moves the cursor up one line
- GDOWNH Moves the cursor down one line
- GLEFTH Moves the cursor left one character
- GRIGHTH Moves the cursor right one character
- GDELETEH Deletes the character under the cursor
- GINSERTH Toggles "insert mode" ON/OFF
- GHOMEH Moves cursor to the start of line/page/message
- GENDH Moves cursor to the end of line/page/message
- GTABH Moves cursor to the next tab position
- GBACKSPACEH Moves cursor left one character and erases
- previous character if at the end of a line or
- "insert mode" is ON.
- GF1H Aborts the current edit, returns to READ mode
- GF2H Saves the message, returns to READ mode
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.02 USING READ MODE
- 151
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 5.02 USING READ MODE
-
-
-
- "Read" mode allows the user to read EMAIL messages in any of the defined
- message areas. There are several keys that are used to control "read" mode
- with a single keystroke:
-
-
-
- GUP and DOWN arrowsH
-
- The UP and DOWN arrow keys move the currently displayed message UP and
- DOWN on your screen allowing you to read more text than will fit on the
- screen.
-
-
- GPGUP and PGDNH
-
- The PGUP and PGDN keys work like the UP and DOWN arrows except they
- advance the text one page at a time.
-
-
- GHOME and ENDH
-
- The HOME key displays the first page of a message; the END key displays
- the last page.
-
-
- GLEFT and RIGHT arrowsH
-
- The RIGHT arrow displays the NEXT message; the LEFT arrow displays the
- previous message.
-
-
- G+ and - keysH
-
- The PLUS and MINUS keys allow you to read by "thread". If a message
- says "Reply to #nnn", you can read the original message (the one replied
- to) by pressing the MINUS (-) key. Pressing PLUS (+) displays the next
- message in the "thread". This is most useful for "local" areas and does
- not usually work in your Network mail area.
-
-
- GNumber keys (0-9)H
-
- You can advance to the desired message simply by entering the message
- number and pressing ENTER.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.02 USING READ MODE
- 152
- --------------------------------------------------------------------------------G
-
-
-
-
- D'Bridge allows for virtually any number of message areas to be defined
- in the area manager. While in READ mode, you may select between the
- different message areas by using the F6 or "A" command. This command
- displays the following screen which allows you to select a new message
- area:
-
-
-
- F1-Enter, F2-Reply, F3-Edit, F4-List, F5-Kill, F6-Areas, ESC-Menu D'Bridge
- 1.50/001002
- /-READ/EDIT EMAIL-------------------------------------------------------------\
- |Msg # 251 |
- |Date: 07/-AREA CHANGE-----------------------------------------------------\ |
- |From: Ch| 0 NETMAIL Network mail area | |
- | To: To| 2 COMPLAIN Complaint Department | |
- |Subj: Gr| 4 DB_ALPHA D'Bridge ALPHA conference | |
- |--------| 6 FTSC Technical standards committee |--|
- |Hello To| 7 NETDEV Network developer's conference | |
- | | 10 SYSOP18 Region 18 Sysop conference | |
- |I was ju| 11 ZMODEM ZMODEM conference | |
- |finishin| 12 ECHOECHO ECHOmail working group | |
- |is well-| 19 SYSOP110 NET 110 Sysop conference | |
- |I won't | 21 DBRIDGE D'Bridge ECHO | |
- | | 22 QUICKBBS QuickBBS ECHO | |
- |Regards,| 24 TBBS TBBS ECHO | |
- |Chris, 2| 9999 BADECHO Bad ECHOmail area | |
- | | | |
- | | | |
- | \-----------------------------------------------------------------/ |
- | |
- | |
- \-----------------------------------------------------------------------------/
-
-
- Change areas either by highlighting the desired area using the UP and
- DOWN arrows and pressing ENTER or by entering the TAG or NUMBER of the
- message area you desire. Pressing ESC will leave you in the same area
- you were in before.
-
- Once DBEDIT is displaying another message area, it should be displaying
- the same message as was there the last time you exited from that area.
- This is a feature of the so-called LAST READ POINTER, which is maintained
- for each user in the editor separately. D'Bridge stores the LAST READ
- POINTERS on your disk so that they are the same the next time you read
- your mail.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.02 USING READ MODE
- 153
- --------------------------------------------------------------------------------G
-
-
-
-
-
- To summarize, we have included the following table of keys and their
- effect in various "read" modes:
-
-
- Mode Key(s) Effect
- --------------------------------------------------------------------
- GREAD F1, EH Enter a new message
- GF2H Enter a reply to a message (see REPLY mode)
- GRH Enter a normal reply
- GQ, >H Enter a quoted reply
- GF3, OH Edit an old message
- GF4, LH Change to LIST mode
- GF5, KH Kill (erase) the current message
- GF6, AH Change message areas
- GESCH Displays the main menu (advanced functions)
- GLEFT arrowH Displays the previous message
- GRIGHT arrowH Displays the next message
- G0..9H Selects message number
- GENTERH Selects message or advances to the next one
- GUP arrowH Scrolls the message up one line
- GDOWN arrowH Scrolls the message down one line
- GPgUpH Scrolls the message up one screen
- GPgDnH Scrolls the message down one screen
- GHOMEH Displays the beginning of the message
- GENDH Moves to the end of the message
- GCTL-CH Leave editor
-
- GREPLY F1H Enter a quoted reply
- GF2H Enter a normal reply
- GESCH Cancel reply
-
- GLIST UP arrowH Moves the highlight bar up one line
- GDOWN arrowH Moves the highlight bar down one line
- GPgUpH Scrolls the screen back one page
- GPgDnH Scrolls the screen forward one page
- GENTERH Select current message, return to READ mode
- GIH Includes the highlighted message
- GEH Excludes the highlighted message
- GAH Includes all messages
- GNH Includes no messages (excludes all)
- GPH Includes all messages on the current page
- GGH Enters GROUP mode
- GESCH Exits LIST mode, displaying the same message
-
- GGROUP PH Print all included messages
- GKH Kills (erases) all included messages
- GESCH Exits GROUP mode, returns to LIST mode
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.03 ADVANCED FEATURES
- 154
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 5.03 ADVANCED FEATURES
-
-
-
- There are several other features available from DBEDIT; they include
- forwarding, copying, moving or printing messages, searching text and
- selecting alternate addresses or "AKA" usernames. To activate the
- EDITOR MENU, press ESC while in "READ" mode; the following menu will
- be displayed:
-
-
-
- Editor menu: UTILITIES SEARCH QUIT D'Bridge
- /--------------------\ 1.50/001002
- /-READ/EDIT EM| Area information |------------------------------------------\
- |Msg # 252 Wri| Forward message | |
- |Date: 11 Jun | Copy message | |
- |From: Chris I| Move message | |
- | To: Tom Ord| Print message |Bridge Support/Europe |
- |Subj: Greetin| Write msg to file | |
- |-------------| New username |------------------------------------------|
- |Hello Tom, | Use alias address | |
- | \--------------------/ |
- |I was just writing to let you know that I've been sitting out in the snow |
- |finishing the D'Bridge documentation. I think that you will find that it |
- |is well-written and quite clear. It's Thursday, so I'll be playing poker |
- |tonight... Give me a call when you get a chance tomorrow! |
- | |
- |Regards, |
- |Chris, 1:110/68 |
- | |
- \-----------------------------------------------------------------------------/
-
-
-
- Following are descriptions of all the options available from the main
- editor menu:
-
-
- GUTILITIES: AREA INFORMATIONH
-
- The AREA INFORMATION screen functions identically to the AREA CHANGE
- function described in the previous section. The difference is that
- AREA INFORMATION displays the number of messages, last read, low and
- high message numbers in each area. D'Bridge displays the areas that
- have new, unread mail in the selected BRIGHT color. Areas which have
- new mail have the HIGHEST message different than the LAST READ.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.03 ADVANCED FEATURES
- 155
- --------------------------------------------------------------------------------G
-
-
-
-
- The information screen looks like this:
-
-
- /-AREA INFORMATION------------------------------------------------------------\
- |# Name Description Low High LR Msgs|
- |0 NETMAIL Network mail area 16 1477 1471 190|
- |2 COMPLAIN Complaint Department 1 1458 1458 17|
- |4 DB_ALPHA D'Bridge ALPHA conference 279 1479 1479 268|
- |6 FTSC Technical standards committee 1 295 261 295|
- |7 NETDEV Network developer's conferenc 1 107 107 95|
- |10 SYSOP18 Region 18 Sysop conference 1 479 479 402|
- |11 ZMODEM ZMODEM conference 1 29 29 29|
- |12 ECHOECHO ECHOmail working group 1 3 3 3|
- |19 SYSOP135 NET 135 Sysop conference 1 178 175 15|
- |21 DBRIDGE D'Bridge ECHO 4 1332 1332 125|
- |22 QUICKBBS QuickBBS ECHO 130 1450 1450 199|
- |24 TBBS TBBS ECHO 621 1182 1080 102|
- |9999 BADECHO Bad ECHOmail area 1 1 1 1|
- | |
- | |
- | |
- \-----------------------------------------------------------------------------/
-
-
-
- GUTILITIES: FORWARD MESSAGEH
-
- The FORWARD MESSAGE option allows you to re-route or send a copy of the
- current message to another system. You simply enter the TO, ADDRESS and
- specify the priority and whether to keep a the original copy of the
- message.
-
-
- GUTILITIES: COPY/MOVE MESSAGEH
-
- The COPY and MOVE MESSAGE commands can only be used when you have
- specified alternate message areas. It will copy or move the current
- message from one area to another.
-
-
- GUTILITIES: PRINT MESSAGEH
-
- Assuming you have a printer connected to your "PRN" port, DBEDIT will
- print the current message.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 5.03 ADVANCED FEATURES
- 156
- --------------------------------------------------------------------------------G
-
-
-
-
- GUTILITIES: WRITE MSG TO FILEH
-
- The WRITE MSG TO FILE option allows you to export a message to a
- standard text file. This might be used to transfer data from D'Bridge
- to a word processor or spreadsheet.
-
-
- GUTILITIES: NEW USERNAMEH
-
- If you have defined more than one USER NAME in the SETUP EDITOR PARAM-
- ETERS menu, you can select from any of these to be the current user.
- This is the same screen you receive when you first start the editor
- with more than one user defined.
-
-
- GUTILITIES: ALIAS ADDRESSESH
-
- For systems who have defined multiple ALIAS ADDRESSES on the BASIC
- CONFIGURATION menu, this function allows you to enter messages
- addressed from one of your aliases.
-
-
- GSEARCH: HEADERS or TEXTH
-
- The SEARCH HEADERS or TEXT options allow you to search through your
- messages for specific keywords. Simply enter the word to search for
- and D'Bridge will find and highlight all occurrences.
-
-
- GQUIT: EXITH
-
- Terminates DBEDIT and returns to D'Bridge.
-
-
- GQUIT: DROP/PUSH TO DOSH
-
- PUSH TO DOS allows you to enter DOS commands and run other programs
- while DBEDIT is still in memory. Type "EXIT" to return to DBEDIT.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.00 UNDERSTANDING THE QUEUE
- 157
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 6.00 UNDERSTANDING THE QUEUE
-
- Everything D'Bridge does is based on the entries in the outbound queue
- window. Once you understand what the "queue" is and how it is organized,
- you will have a good overview of the program's structure.
-
- The "GQUEUEH"
-
- The outbound queue is a database containing entries for each of the
- systems that currently have "outbound" mail. When D'Bridge first starts,
- the outbound queue is created by scanning the NETmail area (either in
- Fido or QuickBBS format), then scanning the disk-based queue for polls,
- file-requests, etc. This database is then sorted by address and finally
- displayed in the bottom-left window.
-
- The queue can best be understood by disabling the SCHEDULE window so
- the entire QUEUE window will be displayed. (Press ALT-S to toggle the
- schedule window on and off).
-
-
- /-QUEUE----------------------------------------------------------------------\
- | Destination Try/Con/Bad/Online Priorities/Pkt types Status |
- |*110/68.1 0 0 0 00:00 C N X M Hold/Unlisted |
- | 105/3 0 0 0 00:00 H X Hold |
- | 108/0 0 0 0 00:00 N F M Decision at 17:00|
- | 135/3 30 0 0 00:00 C X Try limit |
- | 135/142 1 1 0 00:32 Sent successfully|
- | 143/18 1 0 0 00:00 H X Hold |
- | 167/999 0 0 0 00:00 C M Hold/Unlisted |
- | 2:243/40 0 0 0 00:00 H X Hold |
- |*8:77/7 0 0 0 00:00 N T M Hold/Unlisted |
- \----------------------------------------------------------------------------/
-
-
- To understand the queue, you simply need to have a good understanding of
- the individual fields:
-
-
- GDESTINATIONH
-
- The destination is simply the Fidonet or FAX address of the system to
- contact. The destination is not always the "ultimate" destination due
- to possible routing, but is the system to be called.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.00 UNDERSTANDING THE QUEUE
- 158
- --------------------------------------------------------------------------------G
-
-
-
-
- GTRYH
-
- The try field simply shows how many times D'Bridge has tried to call
- the destination system during the current event. If there is a plus
- sign ( + ) behind the number, it has been manually reset this event
- by the operator.
-
-
- GCONH
-
- This field shows the number of actual connections (carrier detects)
- made as the result of outbound calls to the specified system.
- Inbound connections do not count in the CON field. Again, if
- there is a plus sign ( + ) after the number, it has been manually
- reset this event.
-
-
- GBADH
-
- This field shows the number of failures encountered during outbound
- sessions this event. In general, a failure means it was a wasted
- phone call for one reason or another (generally, the reason or error
- is listed in the log file). Again, the plus sign after the number is
- an indication that it has been manually reset (using the ALT-V com-
- mand).
-
-
- GONLINEH
-
- The online field keeps track of total connect time as a summation of
- all outbound connects. This field is not reset until the end of the
- current event.
-
-
- GPRIORITIESH
-
- The priorities field shows which priorities of mail are contained
- within the queue entry. This field may contain any or all of the
- following:
-
- GIH Immediate (Highest priority mail)
- GCH Crash (High priority mail)
- GNH Normal (Normal, budget priority mail)
- GHH Hold (Mail held for pickup)
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.00 UNDERSTANDING THE QUEUE
- 159
- --------------------------------------------------------------------------------G
-
-
-
-
- GPACKET TYPESH
-
- The packet type field contains what types of mail packets are contained
- within the queue entry. The field may contain any or all of the follow-
- ing:
-
- GRH Outbound AREAFIX request (ALT-R)
- GTH Transmit file(s) (ALT-T)
- GFH File-request(s) (ALT-F)
- GPH Poll (ALT-P)
- GXH XMAIL (Editor/BBS/ECHOmail)
- GMH NETmail (Editor/BBS)
-
-
- GSTATUSH
-
- The STATUS field is most-likely the most important one to understand.
- If you are having trouble understanding why a mail packet is not being
- sent, the STATUS indication should be able to tell you exactly what is
- wrong. Please read and understand what the following status indications
- mean:
-
-
- GHoldH
-
- The mail can't be sent because "HOLD" is the only priority specified
- for the mail. (You told it to do this when you entered a message or
- set-up an ECHOmail area).
-
-
- GHold/UnlistedH
-
- This indication means it is impossible to call this system
- because it is either not in your nodelist or it is listed as
- "unpublished". The destination system must call in for its mail
- or you need to get a nodelist containing its phone number.
-
-
- GMax cost holdH
-
- The cost of the message you want to send (as indicated in the editor)
- exceeds the maximum allowed during the current event.
-
-
- GTemporary holdH
-
- This means the operator has used the VIEW/MODIFY QUEUE mode to
- set the entry's status to "hold". To send the message, select
- ALT-V again and specify "SEND".
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.00 UNDERSTANDING THE QUEUE
- 160
- --------------------------------------------------------------------------------G
-
-
-
-
- GForced holdH
-
- This means the operator has specified a forced priority of hold
- at some time in the past. This may be changed by using the ALT-V
- command to remove the "forced" status.
-
-
- GPriority holdH
-
- This means the given mail event does not allow the specified
- priority of mail to be transmitted. (This is related to the
- PRIORITIES field in the advanced routing of the schedule).
-
-
- GNot a CM systemH
-
- In this event, you have specified that only those systems with a "CM"
- (continuous mail) flag may be called. (Again, this is a function of
- the advanced routing screen of the scheduler).
-
-
- GCM not allowedH
-
- In this event you have told D'Bridge not to call any "CM" systems.
-
-
- GDecision at 17:00H
-
- This means that because of the cost-control data, no outbound call
- may be placed to this address until at least 17:00. At 17:00, a
- decision will be made as to whether it may be called or not. This is
- the mechanism which allows D'Bridge to call-out only at the most
- economical times for normal priority mail. If you want the mail to
- be sent now, you should use a higher priority or change the cost-
- control data in the ACCOUNTING/TRANSLATION screen.
-
-
- GTry limitH
-
- This means D'Bridge has exceeded the maximum number of times
- allowed to try calling the remote system. Typically, you are not
- charged for non-connects, but you might want a limit on how many
- tries (gotta give up sometime... ).
-
-
- GSession limitH
-
- You have reached the maximum number of sessions allowed within the
- given event. In the case of long-distance systems, this has most-
- likely saved you a wasted phone call, making too many ECHOmail calls
- in the same event...
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.00 UNDERSTANDING THE QUEUE
- 161
- --------------------------------------------------------------------------------G
-
-
-
-
-
- GFailure limitH
-
- This means you have reached the maximum failures (bad sessions)
- allowed for the event. Maybe something is wrong with the remote
- system?
-
-
- GPicked upH
-
- This means all mail has been successfully picked up by the remote
- system. This saves D'Bridge the trouble and expense of making the
- call itself.
-
-
- GSent successfullyH
-
- This means you called the other system, sent the mail and all went
- well. All mail is confirmed as delivered to the "destination" sys-
- tem; remember that routed mail is now in the hands of another
- operator and is not 100% guaranteed to arrive.
-
-
- G----------H
-
- The dashes (-----) mean that the packet is ready to be sent, now.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.01 CREATING A PRIVATE NODELIST
- 162
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 6.01 CREATING A PRIVATE NODELIST
-
- Without a nodelist, D'Bridge can not make outbound EMAIL calls. Your
- nodelist tells D'Bridge which systems it can communicate with and contains
- information such as name, phone number and baud rate. Nodelists are text
- files that can be created by any standard text editor. It lists ZONES,
- NETS and NODES, one per line, using the "St. Louis format", the same style
- used by Fidonet, Alternet and many other public EMAIL networks. You may
- specify any number of St. Louis or private nodelists in D'Bridge.
- Here's a sample NODELIST for a bogus private network:
-
-
- ,HOST,1720,Main_System,Cincinnati_OH,Rancy_Neagan,1-513-777-0007,9600,CM
- ,1,New_York_Office,Bronx_NY,Quan_Dale,1-202-555-9343,2400,CM
- ,4,Western_Division,Los_Angeles,Clinn_Billton,1-714-555-5286,2400,CM
- ,6,XYZ_Canada,Quebec,Lawrence_DeLaMouche,1-418-555-2811,2400,CM
- ,15,European_Office,The_Hague_NL,Luud_Rubbers,31-70-452121,9600,CM
- ,20,Moscow_Bureau,Moscow_USSR,Joris_Beltsin,!Unlisted,2400,CM
-
-
- This example defined a HOST system and 5 nodes in NET 1720. Unless
- a ZONE directive is specified, NET 1720 will be in whatever zone you
- are in. Notice the format of the text file; no spaces are allowed.
- All underscore characters "_" will be translated to spaces when the
- information is displayed. Each field is separated by commas. The
- following format is used for the "St. Louis format" nodelist:
-
-
- GKEYWORDH,GNUMBERH,GNAMEH,GCITYH,GOPERATORH,GPHONEH,GBAUDH,GFLAGSH
-
-
- GKEYWORDH The KEYWORD directive may be blank or contain any of the
- following values:
-
-
- GZONEH The ZONE keyword marks the start of a new ZONE
- and NET (both with the same number). It also
- defines the NODE that is the ZONE coordinator.
-
- GPOINTH Specifies that this entry is a POINT of the
- previously specified NODE.
-
- GHOSTH The HOST keyword defines the start of a new NET
- number and defines its HOST (a HOST has a NODE
- number of zero).
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.01 CREATING A PRIVATE NODELIST
- 163
- --------------------------------------------------------------------------------G
-
-
-
- GREGIONH The REGION keyword is identical to HOST with the
- exception that no mail will be automatically
- routed through the "HOST" node. This is mainly
- used when the NET covers more than one geographic
- area.
-
- GHUBH The HUB keyword defines the start of a routing
- group. A HUB acts as the HOST to receive in-
- coming mail for all nodes listed after it.
-
- GPVTH Defines that the listed node is private and does
- not have a listed phone number. If a system's
- phone number is not listed, this keyword MUST
- be used.
-
- GDOWNH Defines that the listed node is down and should
- not be added to the database.
-
-
- GNUMBERH This specifies the NODE number of the listed node UNLESS
- the KEYWORD is ZONE, HOST or REGION; in these cases, the
- NUMBER defines the ZONE and/or NET, depending.
-
-
- GNAMEH Defines the name of the system. D'Bridge truncates NAMES
- to 25 characters. Underscores "_" will be translated to
- spaces for display.
-
-
- GCITYH Specifies the city where the system is located. Again,
- underscores "_" translate to spaces.
-
-
- GOPERATORH Defines the name of the primary system operator. Under-
- scores "_" translate to spaces.
-
-
- GPHONEH List the ENTIRE phone number including the COUNTRY CODE,
- AREA CODE and PHONE NUMBER separated with dashes. "-"
- For example: 1-305-232-9365 or 38-52-592831
-
-
- GBAUDH Specify the MAXIMUM BAUD RATE for the system. May be
- either 300, 1200, 2400, 4800, 9600 or 19200.
-
-
- GFLAGSH A free-form field that may contain additional information
- about the system. Include the characters "CM" if you wish
- to designate a system as CONTINUOUS MAIL (24-hours)
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.02 DUTIES OF A NETWORK ADMINISTRATOR
- 164
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 6.02 DUTIES OF A NETWORK ADMINISTRATOR
-
- Every network must have an "administrator" or anarchy would certainly
- prevail! This chapter briefly outlines which duties the administrator
- of any private network should perform. Remember, these are just guidelines.
-
-
- G1H) The NETWORK ADMINISTRATOR is generally responsible for daily
- operation of the network. This means any problems are reported
- directly to the administrator. Obviously, a very large network
- would sub-divide the support into several regional administrators
- who would try to field all problems if they could.
-
-
- G2H) The NETWORK ADMINISTRATOR is responsible for the maintenance of the
- nodelist. Any systems added, changed or deleted must have these
- changes reflected in the nodelist and the new nodelist updates
- must be sent to all systems in the network.
-
-
- G3H) The general structure and routing used in the network must be either
- designed or approved by the NETWORK ADMINISTRATOR. He must be kept
- informed of all aspects of the network so that he can "keep a handle
- on it..."
-
-
- G4H) The NETWORK ADMINISTRATOR will assign NET and NODE numbers unless
- that responsibility is divided into different regions and handled
- by the regional administrators.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 6.03 PUBLIC EMAIL NETWORKS
- 165
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 6.03 PUBLIC EMAIL NETWORKS
-
- There are a number of public amateur networks anyone may join.
- This section lists a few of them and who to contact to participate
- in the network and ECHOmail conferencing. Each network distributes
- its own nodelist in the "St. Louis" format. After you join a new
- network, use the NODELIST CONFIGURATION screen to add the nodelist
- definition and recompile the nodelist. Here are a few networks open
- to new membership:
-
-
- Network Contact
- ------------------------------------------------------------------
-
- GFIDONETH International FidoNet Association
- P.O. Box 41143
- St. Louis, Missouri 63141
- U.S.A.
-
- GALTERNETH InterGalactic Sysop Alliance (ISA)
- P.O. Box 956
- Springfield, New Jersey 07081
- U.S.A.
-
- GEGGNETH Ken Shackelford
- U.S.A.
- EMAIL 99:99/0
- 1-404-928-1876 data
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.00 DBUTIL / UTILITY PROGRAM
- 166
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 7.00 DBUTIL / UTILITY PROGRAM
-
- D'Bridge comes with a utility program called DBUTIL; it allows you to
- automate routine file-transfers and maintenance. Typing DBUTIL from
- the DOS prompt will display the following "help" information:
-
-
- C> GDBUTILH
-
- D'Bridge Utilities 1.50 single-line; Copyright 1987-1992 by Chris Irwin
-
- Valid commands:
-
- [priority] SEND <Address> <file> ... <file> Transmit file(s)
- [priority] ROUTE <Address> <file> ... <file> Transmit file(s)
- [priority] REQUEST <Address> <file> ... <file> File-request
- [priority] POLL <Address> Poll
- PURGE [areaname] [areaname] ... [areaname] Purge/Archive messages
- SORT AREAS Sort message areas/group
- ERASE QUICKBASE CONFIRM Completely erase Quickbase
-
-
- DBUTIL may be run from any directory providing you have included the D'Bridge
- root directory (C:\DB) in your PATH setting in AUTOEXEC.BAT.
-
- ie.
-
- PATH C:\DOS;C:\DB
-
-
- GSENDH
-
- The DBUTIL SEND command adds TRANSMIT-FILE entries to the disk-based
- queue. Files will be sent directly to the destination system with no
- routing. The syntax for the SEND command is:
-
- C> DBUTIL [priority] SEND <Address> <file> ... <file>
-
- ie.
-
- C> DBUTIL CRASH SEND 18/68.5 HOMEWORK.TXT
- C> DBUTIL HOLD SEND 18/20 DB-140*.ZIP DBNET.Z56
- C> DBUTIL SEND MYBOSS READTHIS.TXT
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.00 DBUTIL / UTILITY PROGRAM
- 167
- --------------------------------------------------------------------------------G
-
-
-
- GROUTEH
-
- The DBUTIL ROUTE command does the same thing as the SEND command except
- that it generates a FILE-ATTACH message in the NETMAIL area. Creating
- a message allows the file to be routed if you have specified any file-
- routing in your schedule. If you are not routing files, it is faster
- and better to use the SEND option as it puts entries directly in the
- disk-based queue. The syntax for ROUTE is the same as SEND:
-
- C> DBUTIL [priority] ROUTE <Address> <file> ... <file>
-
- ie.
-
- C> DBUTIL CRASH ROUTE 18/68.5 HOMEWORK.TXT
- C> DBUTIL HOLD ROUTE 18/20 DB-140*.ZIP DBNET.Z56
- C> DBUTIL ROUTE MYBOSS READTHIS.TXT
-
-
-
- GREQUESTH
-
- The DBUTIL REQUEST command adds FILE-REQUEST entries to the disk-based
- queue. The file-request will be sent immediately or during the next
- applicable mail event, depending on the priority you specify. Following
- is the syntax for REQUEST:
-
- C> DBUTIL [priority] REQUEST <Address> <file> ... <file>
-
- ie.
-
- C> DBUTIL CRASH REQUEST 2:280/280 FILES ABOUT
- C> DBUTIL REQUEST 135/14 GOODGAME.ZIP MONOPOLY.ZIP
- C> DBUTIL IMMEDIATE REQUEST MYBOSS UPDATE.ZIP
-
-
-
- GPOLLH
-
- The DBUTIL POLL commands adds a POLL entry to the disk-based queue.
- Depending on the priority, the system will be called either immediately
- or during the next applicable mail event. When you POLL a system,
- D'Bridge will call to see if you have any mail waiting. The syntax for
- POLL is:
-
- C> DBUTIL [priority] POLL <Address>
-
- ie.
-
- C> DBUTIL POLL MYBOSS
- C> DBUTIL IMMEDIATE POLL 1:105/3
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.00 DBUTIL / UTILITY PROGRAM
- 168
- --------------------------------------------------------------------------------G
-
-
-
-
- GPURGEH
-
- The DBUTIL PURGE command will purge the specified message areas or all
- of them if you don't list any AREA NAMES. The purge will scan each
- message area and purge (and archive) the messages based on the criteria
- specified in the LOCAL/ECHOMAIL AREAS screen; see SECTION 3.2 for more
- information. The syntax for the PURGE command is:
-
- C> DBUTIL PURGE [areaname] [areaname] ... [areaname]
-
- ie.
-
- C> DBUTIL PURGE
- C> DBUTIL PURGE POLITICS SCIENCE ART
-
-
- GSORT AREASH
-
- If you wish to reorganize the areas in your LOCAL/ECHOMAIL AREAS screen,
- you may use the SORT AREAS command. This will sort and renumber your
- areas by SORT GROUP and TAG. Before using this command, make sure you
- specify SORT GROUPS for all the areas and group them together in a
- logical manner. The syntax is:
-
- C> DBUTIL SORT AREAS
-
-
- GERASE QUICKBASEH
-
- If you want to completely destroy and recreate your QuickBBS message
- base, you may do it with this command. You really had better be SURE
- you want to do this or you could lose thousands of EMAIL messages
- with this single command. The syntax is:
-
- C> DBUTIL ERASE QUICKBASE CONFIRM
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.01 FIDO AND QUICKBBS STORAGE
- 169
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 7.01 FIDO AND QUICKBBS STORAGE
-
- D'Bridge currently supports two methods for storing EMAIL messages on
- disk. These particular methods were chosen for compatibility with
- some popular bulletin board systems:
-
-
- GFIDOH Using the FIDO storage method, each message is stored in
- a separate ".MSG" file in a certain directory. Each fido-
- style local or ECHOmail area will have a unique sub-
- directory. This method is compatible with Fido and Opus,
- as well as many message handling utilities. FIDO storage
- usually takes the most disk space and is the slowest
- method available.
-
- GQuickBBSH The QUICKBBS storage method stores all messages in five
- data files: MSGHDR.BBS, MSGTXT.BBS, MSGIDX.BBS, MSGTOIDX.BBS
- and MSGINFO.BBS, all stored in the specified QuickBBS
- directory. Using this method, up to 200 message areas may be
- defined. This method is fast and doesn't use too much disk
- space; it is provided for compatibility with the QuickBBS
- bulletin board system.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.02 USING THE SCRIPTING LANGUAGE
- 170
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 7.02 USING THE SCRIPTING LANGUAGE
-
- D'Bridge includes a powerful scripting language allowing it to use
- alternate carriers such as packet-switched networks rather than normal
- telephone connections. This can be used with any carrier such as Tele-
- net's PC-Pursuit or your private Satellite uplink service. Any data
- carrier capable of 8-bit, no parity, full duplex communication may be
- used with D'Bridge. The reason for using an alternate carrier is usu-
- ally to save money on your phone bill.
-
- The scripting language connects two D'Bridge systems through any form
- of data link that is compatible. In the U.S.A., the most common example
- for using scripts is PC-Pursuit, so I'll use that as an example. Script
- files are text-files created by any standard text editor and contain
- keywords telling D'Bridge exactly what to do. It is important to have
- a good understanding of the carrier you intend to use before designing
- your script file; this is necessary for a good understanding of all the
- terms used here - it's not that simple.
-
- To use a script file, you will need to have a PHONE NUMBER TRANSLATION
- or OVERRIDE for each area code or system you intend to use. With PC-
- Pursuit, this currently requires 40 translation strings, one for each
- city served. I intend to use an indexed database in a future release
- to eliminate this necessity, but that's later. For now, use a trans-
- lation in the following format:
-
- Gcc-aaa- "script.fil"xxxxx-H
-
- Where "cc" is the COUNTRY CODE, "aaa" is the AREA CODE, and "xxxxx" is
- the translated AREA CODE (or in the case of PC-Pursuit, the city des-
- ignator). As an example, use the following PHONE NUMBER TRANSLATION to
- reach the Miami, Florida area:
-
- G1-305- "PCP.SCR"FLMIA-H
-
- This will translate ALL 305 area codes to use the script file. Needless
- to say, not all of area code 305 is PC-Pursuitable, so if you need to
- contact other cities in our area code, you will need to specify previous
- translation or override strings (the upcoming index file will eliminate
- the need for these translations altogether).
-
- Assuming you now have 305 translated to use the PCP.SCR script file,
- you now must create this file and put it in your defined SCRIPT PATH
- (SCRIPT PATH is defined on the DIRECTORY PATHS setup screen). With
- D'Bridge, it is possible to use one script file for ALL the "pursuitable"
- cities, though you will need one for each baud rate desired. Following
- is a detailed description of the scripting language keywords and their
- meaning (see the next chapter for a specific example and explanation
- using PC-Pursuit):
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.02 USING THE SCRIPTING LANGUAGE
- 171
- --------------------------------------------------------------------------------G
-
-
-
-
-
- Syntax: GABORTH <Gstart_timeH> <Gend_timeH>
-
- Example: GABORT 6:00 18:00H
-
- The ABORT keyword causes the script to abort immediately if the time is
- between the <start_time> and <end_time> specified. This is handy for
- making sure no script calls are made outside predefined hours.
-
-
-
- Syntax: GAREACODEH
-
- The AREACODE keyword causes D'Bridge to transmit the AREA CODE field of
- the phone number. This is separated from the PHONE NUMBER by a dash "-"
- and is sent with no carriage return or other characters. For PC-Pursuit,
- this is usually substituted with the city code (such as FLMIA).
-
-
-
- Syntax: GBAUDH <Gbaud_rateH>
-
- Example: GBAUD 1200H
-
- The BAUD keyword changes the current baud rate to the specified value.
- By default, it will be the baud rate of the destination system.
-
-
-
- Syntax: GCARRIERH
-
- When the CARRIER keyword is encountered, the script file is aborted
- unless a carrier is detected at this point. This is handy for ensuring
- you have a carrier when you think you should.
-
-
-
- Syntax: GCOMMH <Gconfig_charactersH>
-
- Example: GCOMM 7E1H
-
- The COMM keyword configures the communication port for the setting
- specified. In this example, it is set for 7 data bits, even parity
- and 1 stop bit. The following <config_characters> are supported:
-
-
- G1H - 1 stop bit GNH - No parity
- G2H - 2 stop bits GEH - Even parity
- G7H - 7 data bits GOH - Odd parity
- G8H - 8 data bits
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.02 USING THE SCRIPTING LANGUAGE
- 172
- --------------------------------------------------------------------------------G
-
-
-
-
-
- Syntax: GCONNECTH
-
- The CONNECT keyword sets the CONNECT count for the given packet is
- increased by one. This is used in conjunction with the maximum
- connects limit defined for the current mail event.
-
-
-
- Syntax: GDIALH <Gphone_numberH>
-
- Example: GDIAL 555-2939H
-
- The DIAL keyword causes D'Bridge to dial the <phone_number> specified
- and wait for a CONNECT, BUSY or NO CARRIER field just like when dialing
- normally. If a non-connect message is received, the script is aborted.
-
-
-
- Syntax: GDIRECTH <Gstart_timeH> <Gend_timeH>
-
- Example: GDIRECT 6:00 18:00H
-
- The DIRECT keyword will cause D'Bridge to abort the script file and dial
- direct (using your phone company) between the times specified. This is
- useful for switching between script and telephone company use depending
- on the time of day.
-
-
-
- Syntax: GDOSH <GDOS_commandH>
-
- Example: GDOS ibm_uucp 2400H
-
- The DOS keyword is seldom used, but it enables you to execute any DOS
- command from within a script file. In this example, the program
- "IBM_UUCP" is executed with a parameter of 2400.
-
-
-
- Syntax: GGOTOH <GlabelH>
-
- Example: GGOTO LOOP-1H
-
- The GOTO keyword transfers control to another point within the script
- file. The <label> must exist and start with a colon ":" just like in
- DOS batch files. Caution should be used in not creating "endless
- loops" without a TIMER statement preceding them.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.02 USING THE SCRIPTING LANGUAGE
- 173
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- Syntax: GIFH <Gpattern_numberH> <GlabelH>
-
- Example: GIF 2 GOTO SUCCESSH
-
- The IF keyword transfers control to another point in the script file
- if a previously defined pattern has been detected. This is used in
- conjunction with the PATTERN keyword and uses the same label structure
- as the GOTO keyword. It is also possible for IF to cause "endless loops"
- if your script is not designed correctly, so use of the TIMER keyword
- is highly desirable.
-
-
-
- Syntax: GINITH
-
- The INIT keyword causes D'Bridge to send it's standard initialization
- string to the modem. This is normally done at the beginning of every
- script, but may not be necessary.
-
-
-
- Syntax: GPATTERNH <Gpattern_numberH> <GstringH>
-
- Example: GPATTERN 0 BUSYH
-
- The PATTERN keyword defines a pattern to look for from the remote system
- or modem. It is used in conjunction with the WAIT and IF keywords to
- act based on the response received. The <pattern_number> must be from
- 0 to 9 and the <string> may be up to 20 characters. If "PATTERN 0" is
- specified with no characters after it, pattern 0 is disabled.
-
-
-
- Syntax: GPHONEH
-
- The PHONE keyword causes D'Bridge to transmit the PHONE NUMBER field.
- This is sent with no additional characters such as carriage return, so
- if you want to send one, use the XMIT keyword after the PHONE keyword.
-
-
-
- Syntax: GSESSIONH
-
- The SESSION keyword is used to begin the mail session. When it is
- encountered, the script file terminates and D'Bridge starts trying
- to sync with the destination system. If there is no carrier detected
- at this point, the session will be aborted. Make sure this is only
- used once a "CONNECT" signal is received from the remote modem.
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.02 USING THE SCRIPTING LANGUAGE
- 174
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- Syntax: GTIMERH <GsecondsH>
-
- Example: GTIMER 300H
-
- The TIMER keyword sets an overriding timeout on the execution of the
- script file. This is especially handy when you have created "endless
- loops" for re-dialing within your script file. If no TIMER value is
- specified, D'Bridge will keep dialing "forever" until it gets through.
- Every time the TIMER keyword is encountered, the timer is cleared. For
- this reason, care should be taken to ensure it is not within an "end-
- less loop".
-
-
-
- Syntax: GWAITH <GsecondsH>
-
- Example: GWAIT 20H
-
- The WAIT keyword causes the script to wait for the specified number of
- seconds for one of the patterns (previously defined) to be received.
- If none of the patterns are received within <seconds> seconds, the
- script is aborted. The PATTERN keyword defines the pattern(s) to wait
- for.
-
-
-
- Syntax: GXMITH <GstringH>
-
- Example: GXMIT HELLO|~~~52937,334|H
-
- The XMIT keyword causes D'Bridge to transmit characters to the remote
- system (or your modem if not currently connected to anything). This
- command is executed literally and there must be only one space between
- XMIT and <string> or the spaces will also be sent. There are two
- special characters used in the XMIT keyword:
-
- "G|H" causes a carriage return (CR) to be sent
- "G~H" causes a one-second delay in execution
-
- The script file is executed much like a program, sequentially. The
- only exception is when control is transferred to another part by using
- an IF or GOTO keyword. Any errors in the script file will only be
- found when the keyword is executed. Use the script debugging windows
- while testing scripts; these will display the communications plus what
- keywords are being executed. Activate these windows by answering YES
- to the DIAGNOSTICS? question on the BASIC CONFIGURATION screen.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 7.03 EXAMPLE SCRIPT FILE
- 175
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 7.03 EXAMPLE SCRIPT FILE
-
- The following example script file is the one Tony Wagner wrote for use
- with the PC-Pursuit service. It is currently used by a fair number of
- people with success. You will need to customize it somewhat to work in
- your city and use your own password.
-
-
- INIT
- TIMER 600
- BAUD 2400
- DIAL XXX-XXXX
- XMIT @~D~|~D1|
- :RETRY
- PATTERN 0 @
- WAIT 30
- XMIT C D/
- AREACODE
- XMIT /24,YOUR ID#|
- XMIT PASSWORD|
- PATTERN 0 CONNECT
- PATTERN 1 ONLINE
- PATTERN 2 BUSY
- PATTERN 3 RE-ENTER
- PATTERN 4 MANUAL
- PATTERN 5 NOT
- WAIT 30
- IF 2 RETRY
- IF 3 RETRY
- IF 5 RETRY
- TIMER 600
- XMIT ~|~@~|
- XMIT ~SET 1:0,7:0|
- XMIT CONT|
- XMIT |~I~|~ATZ|
- :CITY_CONNECT
- XMIT ~ATDT
- PHONE
- XMIT |
- WAIT 45
- IF 2 CITY_CONNECT
- IF 4 CITY_CONNECT
- SESSION
-
-
- The above script is a rapid-dial script that tries for a maximum of
- five minutes to connect with the desired city. Once in the city, it
- then re-dials the destination system for a maximum of five minutes.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.00 BBS SYSTEMS
- 176
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.00 BBS SYSTEMS
-
- D'Bridge is designed to act as a FRONT-END for "online" programs such as
- BBS (bulletin board systems) and database systems. D'Bridge will answer
- the phone and determine whether an incoming call is EMAIL or HUMAN. If it
- is an EMAIL call, D'Bridge automatically receives the mail and/or files and
- returns to the idle state. If a HUMAN call is detected, control may be
- transferred to another program such as a bulletin board system. It will
- take about 10 seconds for D'Bridge to decide whether a caller is HUMAN;
- this time-period can be increased if desired. If the caller presses the ESC
- key twice, D'Bridge will assume the call is HUMAN and transfer control to
- the BBS immediately.
-
- Every BBS software package is configured slightly differently, therefore
- D'Bridge needs to be flexible in the way it transfers control while the
- caller remains online. There are three basic ways of invoking your BBS
- program:
-
-
- PUSH Using the PUSH method, you simply specify a series of DOS
- commands to be executed. You may even invoke a batch file
- in this method. Only the memory D'Bridge is not using will
- be available for the BBS. The PUSH method is designated by
- simply typing the commands in the DOS BBS COMMANDS window.
-
- ie. CD \OPUS
- OPUS OPUS -B*B -T*T
-
-
- DROP The DROP method is similar to the PUSH method, except that
- all available memory (except 15K) is freed, leaving almost
- all system memory free for the BBS to use. This is handy
- if you have a large D'Bridge configuration or your BBS has
- a lot of "door" programs that it spawns. The DROP method is
- designated by typing a plus sign "+" in front of the commands
- in the DOS BBS COMMANDS window.
-
- ie. CD \OPUS
- +OPUS OPUS -B*B -T*T
-
-
- EXIT With the EXIT method, D'Bridge completely terminates, exiting
- with an errorlevel designating the baud rate. If you use this
- method, you must be running the mailer from a batch file set
- up to trap the various errorlevels. To configure the EXIT
- method, specify *X on a line by itself in your DOS BBS COMMANDS
- window.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.00 BBS SYSTEMS
- 177
- --------------------------------------------------------------------------------G
-
-
-
-
- ie. *X
-
- An example of a simple batch file that would work with the
- EXIT method demonstrates the setup for a 2400 baud modem.
- Note that the errorlevel returned by D'Bridge is equal to
- the BAUD RATE / 100.
-
- :TOP
-
- DB
-
- IF ERRORLEVEL 24 GOTO 2400BAUD
- IF ERRORLEVEL 12 GOTO 1200BAUD
- IF ERRORLEVEL 3 GOTO 300BAUD
-
- GOTO END
-
- :2400BAUD
-
- CD\OPUS
- OPUS OPUS -B2400
- GOTO TOP
-
-
- :1200BAUD
-
- CD\OPUS
- OPUS OPUS -B1200
- GOTO TOP
-
-
- :300BAUD
-
- CD\OPUS
- OPUS OPUS -B300
- GOTO TOP
-
-
-
- If you are not familiar with batch files and you must use
- them, see the IBM DOS manual.
-
-
- Every time a BBS call is detected, control is transferred to your BBS
- software by executing the commands located in the DOS BBS COMMANDS
- window. You may specify any number of DOS commands in this window to
- be executed in sequence.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.00 BBS SYSTEMS
- 178
- --------------------------------------------------------------------------------G
-
-
-
- Each line must contain a valid DOS command, or a D'Bridge "directive".
- If an entry begins with a plus sign (+) the command will be executed
- using the DROP method rather than the PUSH method. If you use DROP,
- D'Bridge will be entirely swapped out of memory (except 15K) allowing
- the called program almost all the free memory in the environment. This
- is nice for running BBS programs that have "door" utilities. The DROP
- method takes longer to execute than the PUSH method. D'Bridge memory
- is swapped to either EMS or DISK.
-
- Following is an example of how I run the QuickBBS bulletin board:
-
- CD \QUICKBBS
- +QUICKBBS -b*b -t*t -e0
-
- Any entries with an asterisk "*" will be treated as D'Bridge directives
- or substitutions. When the above DOS BBS COMMANDS are executed, the
- following is an example of the actual DOS commands issued:
-
- CD \QUICKBBS
- QUICKBBS -b2400 -t126 -e0
-
-
- Following is a description of the D'Bridge directives available:
-
- G*BH Substituted with the actual BAUD RATE of the connection.
-
- G*CH Substituted with the actual connect string returned from
- the modem. This may be translated to any string you wish
- by using the "CONNECT" COMMANDS field of the COMMUNICATION/
- MODEM SETUP screen.
-
- G*HH If specified, leaves the FOSSIL "HOT" or initialized.
-
-
- G*PH Returns the COMM PORT D'Bridge is currently using. This
- may be from 1 to 7.
-
- G*RH Causes a NETMAIL rescan to occur after each BBS call.
-
- G*SH Causes an ECHOmail scan to occur after each BBS call.
-
- G*TH Substituted by the number of minutes until the next event.
-
- G*XH Exit D'Bridge with an errorlevel of the baud rate divided
- by 100 (3,12,24,48 or 96). If you use this method (which is
- not suggested), you will need to write a batch file like
- the one described on the preceding page.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.00 BBS SYSTEMS
- 179
- --------------------------------------------------------------------------------G
-
-
-
-
- *Xnnn Exit D'Bridge with the specified errorlevel. If you use
- this method, you must be using some alternate method to
- pass the baud rate to the system.
-
-
- Any DOS command with the exception of EXIT, PROMPT and SET will work
- in the DOS BBS COMMANDS window. Changing directories is allowed;
- D'Bridge will automatically switch back to the DB root directory
- when the commands are finished. You do not have to specifically
- change directories after the BBS call.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.01 GENESIS DELUXE BBS
- 180
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.01 GENESIS DELUXE BBS
-
-
- Genesis Deluxe Bulletin board system is available from PRISM Software.
- In order to configure Genesis and D'Bridge together, follow these
- steps:
-
-
- 1) Configure Genesis Deluxe as follows. This uses the US Robotics
- HST Dual Standard as an example. If you use a different modem, the
- parameters may vary. You may leave all the initialization fields
- as they are, Genesis will ignore them when using a front end mailer.
-
-
- 2) Genesis does not accept 4800 or 14400 as valid command line baud
- rates.
- Configure the "CONNECT" COMMANDS field on the COMMUNICATION MODEM
- SETUP screen:
-
-
- /-------------------------------------------------------------------\
- | "CONNECT" commands: 9600 CONNECT 4800|9600 |
- | 19200 CONNECT 14400|19200 |
- \-------------------------------------------------------------------/
-
-
- 3) There are 2 ways to setup Genesis under D'Bridge.
-
- OPTION "A" - Spawn a batch file using the DROP method
-
- With the DROP method, D'Bridge swaps almost all its used RAM to
- EMS or disk, then "spawns" a batch file which invokes Genesis.
- This is the fastest method if you have EMS.
-
- a) Enter the following in the DOS BBS COMMANDS window on the
- BBS CONFIGURATION screen:
-
- /--------------------------------------------------------\
- | DOS commands for BBS: +MGEN.BAT *P *B *T |
- | |
- \--------------------------------------------------------/
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.01 GENESIS DELUXE BBS
- 181
- --------------------------------------------------------------------------------G
-
-
-
- b) Create a batch file called MGEN.BAT in the D'Bridge root
- directory. Use the following as an example:
-
- @ECHO OFF
- :START
- D:
- cd\gendlx
- GENESIS %1 SINGLE %2 %2 %3
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- GOTO END
-
- :DROP
- CTTY COM%1
- ECHO Type Exit to return to the BBS
- C:\COMMAND.COM
- CTTY CON
- goto DOORBACK
-
- :DOOR
- CALL DOOR.BAT
-
- :DOORBACK
- D:
- CD\GENDLX
- GENESIS %1 SINGLE
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
-
- :END
- H:
- CD\DBRIDGE
-
-
- OPTION "B" - Run D'Bridge from a batch file and EXIT
-
- With the EXIT method, D'Bridge is completely removed from memory
- when Genesis takes control. This method requires D'Bridge to be
- fired up from a batch file. Following is a description of how to
- configure the software for this method:
-
- a) Enter the following in the DOS BBS COMMANDS window on the
- BBS CONFIGURATION screen:
-
- /--------------------------------------------------------\
- | DOS commands for BBS: *X |
- | |
- \--------------------------------------------------------/
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.01 GENESIS DELUXE BBS
- 182
- --------------------------------------------------------------------------------G
-
-
-
-
-
- b) Create a batch file called RUN-DB.BAT using the following
- model as an example. Start D'Bridge by using this batch
- file, most-likely by calling it directly from AUTOEXEC.BAT:
-
-
-
- @ECHO OFF
- H:
- CD\DBRIDGE
-
- :LOAD_DB
- DB
- IF ERRORLEVEL 192 GOTO 19200
- IF ERRORLEVEL 96 GOTO 9600
- IF ERRORLEVEL 50 GOTO RENUM
- IF ERRORLEVEL 48 GOTO 4800
- IF ERRORLEVEL 24 GOTO 2400
- IF ERRORLEVEL 12 GOTO 1200
- IF ERRORLEVEL 10 GOTO LOCALBBS
- IF ERRORLEVEL 3 GOTO 300
- IF ERRORLEVEL 0 GOTO END
-
- GOTO LOAD_DB
-
- :LOCALBBS
- D:
- CD\GENDLX
- GENESIS 1 SINGLE
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :RENUM
- H:
- CD\DBRIDGE
- DBLOG 2 DBRIDGE.LOG
- MREN -R -P -L -DB
- MREN -R -P -L -DB H:\DBRIDGE\MESSAGES
- CD\NETMAIL
- SMLINDEX
- CD\DBRIDGE
- GOTO LOAD_DB
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.01 GENESIS DELUXE BBS
- 183
- --------------------------------------------------------------------------------G
-
-
-
- :300
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 300
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :1200
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 1200
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :2400
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 2400
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :4800
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 4800
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :9600
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 9600
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.01 GENESIS DELUXE BBS
- 184
- --------------------------------------------------------------------------------G
-
-
-
-
- :19200
- D:
- CD\GENDLX
- GENESIS 1 SINGLE 0 19200
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :DROP
- CTTY COM1
- C:\COMMAND.COM
- CTTY CON
- goto DOORBACK
-
- :DOOR
- D:
- CD\GENDLX
- CALL DOOR.BAT
- GOTO DOORBACK
-
- :DOORBACK
- D:
- CD\GENDLX
- GENESIS 1 SINGLE
- IF ERRORLEVEL 9 GOTO DROP
- IF ERRORLEVEL 8 GOTO DOOR
- H:
- CD\DBRIDGE
- GOTO LOAD_DB
-
- :END
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.02 MAXIMUM BBS
- 185
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.02 MAXIMUM BBS
-
-
- D'Bridge is completely compatible with the Maximus CBCS.
- In order to configure D'Bridge with Maximus, follow these simple steps:
-
-
- 1) Your MAX.CTL file includes the following line:
-
- After Call Exit 5
-
- This is absolutely correct - please do not change it to any other value.
-
-
- 2) There are three methods for running Maximus from D'Bridge:
-
-
- a) Using the PUSH method, D'Bridge "spawns" the Maximus program; this
- is the fastest way, but requires the most memory. To configure
- this, specify the following in the DOS BBS COMMANDS window:
-
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \MAX |
- | MAX -B*B -T*T |
- | |
- \---------------------------------------------------------/
-
-
- b) Using the DROP method is almost identical. This way, D'Bridge
- swaps its memory to EMS or disk, then runs Maximus. Simply put a
- plus sign "+" in front of the Maximus command like this:
-
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \MAX |
- | +MAX -B*B -T*T |
- | |
- \---------------------------------------------------------/
-
-
- c) Using the EXIT method, D'Bridge must be run from a batch file.
- This requires some understanding of DOS, since your system will
- be setup slightly different than our example.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.02 MAXIMUM BBS
- 186
- --------------------------------------------------------------------------------G
-
-
-
- Here is an example to put in the DOS BBS commands field:
-
- /----------------------------------------------------------------\
- | DOS commands for BBS: ECHO CD \MAX >BBS.BAT |
- | ECHO MAX -B*B -T*T >>BBS.BAT |
- | ECHO :DOERLVL >>BBS.BAT |
- | ECHO IF ERRORLEVEL 17 GOTO DOOR >>BBS.BAT|
- | ECHO IF ERRORLEVEL 1 GOTO END >>BBS.BAT |
- | ECHO GOTO END >>BBS.BAT |
- | ECHO :DOOR >>BBS.BAT |
- | ECHO CALL C:\MAX\SYSOP.BAT >>BBS.BAT |
- | ECHO MAX -R >>BBS.BAT |
- | ECHO GOTO DOERLVL >>BBS.BAT |
- | ECHO :END >>BBS.BAT |
- | ECHO CD \DB >>BBS.BAT |
- | ECHO RUN-DB.BAT >>BBS.BAT |
- | *X20 |
- \----------------------------------------------------------------/
-
- Special definitions in this batch:
-
- ERRORLEVEL 17 - example for a doorway call from within MAXIMUS
- SYSOP.BAT - a batch, that calls doorway, like this one:
- CD C:\DB\DOOR
- DOORWAY COM2 /I:MENU.TXT /S:* /G:ON /V:D /M:100 /B:MSZ /C:DOS
- DOERLVL - tells MAXIMUS to use errorlevels
- ERRORLEVEL 1 - No idea, what is was for - once there was an error without
- this line, so it had been included
- Maybe it works without it...
- MAX -R - Returns to MAXIMUS
- RUN-DB.BAT - the batch to start D'Bridge
- *X20 - The errorlevel in the D'Bridge batch, which calls BBS.BAT
-
- With this method the batch, which calls MAXIMUS is always written "live"
- by DB and the baud rate and rest time (until next event) will be passed
- to MAXIMUS.
-
- Create a batch file called RUN-DB.BAT containing at least the following:
-
- ECHO OFF
- :START
- C:
- CD \DB
- DB
- IF ERRORLEVEL 20 GOTO LOADBBS
- GOTO END
-
- :LOADBBS
- BBS.BAT
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.02 MAXIMUM BBS
- 187
- --------------------------------------------------------------------------------G
-
-
-
- :END
- EXIT
-
- To start D'Bridge, simply type RUN-DB from the D'Bridge root
- directory.
-
- - please remember to use a fossil with MAXIMUS -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.03 OPUS CBBS
- 188
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.03 OPUS CBBS
-
-
- D'Bridge is completely compatible with the Opus CBBS (Conversational
- bulletin board system.) In order to configure D'Bridge with Opus, follow
- this simple steps:
-
-
- 1) Edit your OPUS.CTL file to include the following line:
-
- Exit 15
-
- This tells Opus to exit after each call with an errorlevel of 15;
- when this happens, control is returned to D'Bridge.
-
-
- 2) Recompile your OPUS.PRM file by using the OPUSCTL command. See the
- Opus DOCs for more information.
-
-
- 3) There are three methods for running Opus from D'Bridge:
-
-
- a) Using the PUSH method, D'Bridge "spawns" the Opus program; this
- is the fastest way, but requires the most memory. To configure
- this, specify the following in the DOS BBS COMMANDS window:
-
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \OPUS |
- | OPUS OPUS -B*B -T*T |
- | |
- \---------------------------------------------------------/
-
-
- b) Using the DROP method is almost identical. This way, D'Bridge
- swaps its memory to EMS or disk, then runs Opus. Simply put a
- plus sign "+" in front of the opus command like this:
-
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \OPUS |
- | +OPUS OPUS -B*B -T*T |
- | |
- \---------------------------------------------------------/
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.03 OPUS CBBS
- 189
- --------------------------------------------------------------------------------G
-
-
-
-
- c) Using the EXIT method, D'Bridge must be run from a batch file.
- This requires some understanding of DOS, since your system will
- be setup slightly different than our example. Put the following
- in the DOS BBS commands field:
-
-
- /---------------------------------------------------------\
- | DOS commands for BBS: ECHO CD \OPUS >BBS.BAT |
- | ECHO OPUS OPUS -B*B -T*T >>BBS.BAT|
- | ECHO CD \DB >>BBS.BAT |
- | ECHO RUN-DB.BAT >>BBS.BAT |
- | *X20 |
- \---------------------------------------------------------/
-
-
-
- Create a batch file called RUN-DB.BAT containing at least
- the following:
-
-
- ECHO OFF
- :START
- C:
- CD \DB
- DB
- IF ERRORLEVEL 20 GOTO LOADBBS
- GOTO END
-
- :LOADBBS
- BBS.BAT
-
- :END
- EXIT
-
-
- To start D'Bridge, simply type RUN-DB from the D'Bridge root
- directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.04 PC-BOARD
- 190
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.04 PC-BOARD
-
-
- PCBoard is available from Clark Development Company. It is another
- excellent BBS package with particularly strong support for DOORs, and
- it runs very well with D'Bridge. In order to configure PCBoard with
- D'Bridge, follow these steps:
-
-
- Note that since this method uses DOS 3.3's CALL command, it will not
- work with earlier versions of DOS. It should work with DOS 4.x.
-
-
-
- 1) Configure PCBoard's MODEM INFORMATION screen as shown below. The
- example shown is for a US Robotics HST 9600 bps modem, with the comm
- port locked at 19200. If you are using a different modem, you will
- need to make some adjustments to the parameters. PCBoard will
- receive the caller online after D'Bridge answers the call.
-
-
- /-----------------------------------------------------------------------\
- | Modem Information |
- | |
- | Seconds to wait for carrier : 60 |
- | Comm Port (COM1,COM2,NONE) : COM2 |
- | Opening Baud Rate (300-38400) : 19200 |
- | Lock in Opening Baud Rate : Y |
- | Modem Initialization String : ATE0M1H0 |
- | Modem Off-Hook String : ATE0M0H1 |
- | Disable CTS/RTS checking : N |
- | Using a Hayes V-Series 9600 : N |
- | Using a FastComm 9600 : N |
- | Reset Modem During Recycle : N |
- | Modem Off-Hook During Recycle : N |
- | Packet-Switch Network : N |
- | Answer on True Ring Detect : N |
- | Allow Callers at 7,E,1 : N |
- | Allow 300 Baud Callers : N |
- | Allow 300 Baud Start Time : 00:01 |
- | Allow 300 Baud Stop Time : 24:00 |
- | |
- \-----------------------------------------------------------------------/
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.04 PC-BOARD
- 191
- --------------------------------------------------------------------------------G
-
-
-
- 2) In PCBoard's OPTIONS #1 screen, set PCBoard to drop to DOS after
- each call:
-
-
- /-----------------------------------------------------------------------\
- | Options #1 |
- | |
- | Exit to DOS After Each Call : Y |
- \-----------------------------------------------------------------------/
-
-
- 3) In D'Bridge's COMM PORT / MODEM SETUP screen, set it up as shown
- below (again, this is for a USR 9600 HST). Modify to suit your
- modem. The "CONNECT" commands are very important. You must use
- the appropriate translations so that PCBoard will understand the
- connect codes later in the batch files.
-
-
- /-------------------------------------------------------------------\
- | Modem port: COM2 (COM1-COM7 or NONE) |
- | Baud rate: 19200 |
- | Locked? Yes |
- | Use RTS-CTS? Yes |
- | Initialize: ATE0F1M1X6Q0V1&K0&B1H0S0=0 |
- | Offline: ATE0M0H1 |
- | Drop DTR? Yes |
- | Answer: ATA |
- | Dial 300: ATDT |
- | " 1200: ATDT |
- | " 2400: ATDT |
- | " 4800: ATDT |
- | " 9600: ATDT |
- | " 19200: ATDT |
- | Specific dial: |
- | "RING" commands: RING |
- | "CONNECT" commands: 300 CONNECT|/C:0 |
- | 1200 CONNECT 1200|/C:2 |
- | 2400 CONNECT 2400|/C:3 |
- | 2400 CONNECT 2400/ARQ|/C:3 /ERR |
- | 9600 CONNECT 9600/ARQ|/C:5 /ERR |
- | "ABORT" commands: VOICE |
- | Char delay: 15 (milliseconds) |
- | Modem timeout: 45 (seconds) |
- | Carrier detect mask: 128 (almost always 128) |
- | Auto-init modem? Yes |
- \-------------------------------------------------------------------/
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.04 PC-BOARD
- 192
- --------------------------------------------------------------------------------G
-
-
-
-
- 4) In D'Bridge's BBS CONFIGURATION screen, set the "DOS commands for
- BBS:" as shown below:
-
-
- /-----------------------------------------------------------\
- | DOS commands for BBS: ECHO PCBOARD *C > C:\PCB\PCBBAT.BAT |
- | *X20 |
- \-----------------------------------------------------------/
-
- 5) If you run in a DESQview environment, create a batch file called
- "PrepDb.bat". I keep mine in my C:\Batch directory, which is in
- my DOS path. In your DESQview "Add a program" screen, you will run
- this batch file to run D'Bridge. It sets up the stuff for the DB
- window that only needs to be done once, instead of doing it every
- time the board recycles.
-
- @Echo Off
- REM PrepDb.bat file to start D'Bridge from DESQview
- Dnansi
- RunDB
-
-
- 6) If you are not running in DESQview, make sure you have ANSI.SYS
- loaded in your config.sys file. In either case, make sure X00.SYS
- is loaded in CONFIG.SYS.
-
-
- 7) The main batch file running D'Bridge is RunDb.bat... If you are
- running in DESQview, PrepDb.bat will run RunDb.bat as the last item,
- if not, you will run it directly from DOS using the RunDB.bat file.
-
- REM Rem Main Batch file to run D'Bridge
- @Echo Off
- C:\CAPTURE
- E:
- CD \DB
- DB
- If ErrorLevel 90 Goto Maint
- If ErrorLevel 20 Board
- Goto END
- :MAINT
- Call Maint
-
- :END
- Exit
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.04 PC-BOARD
- 193
- --------------------------------------------------------------------------------G
-
-
-
-
- 8) Modify your PCBoard BOARD.BAT file so it looks like the example
- below.
-
- @Echo off
- C:
- Cd\Pcb
- If Exist Remote.bat Rename Remote.bat Remote.sys
- If Exist Event.bat Rename Event.bat Event.sys
- If Exist Door.bat Del Door.bat
- If Exist Endpcb del Endpcb
-
- Call PCBBAT
-
- If Exist Remote.bat Remote
- If Exist Door.bat Door
- If Exist Event.bat Event
- Cls
- RunDB
-
-
- 9) Now, when a BBS caller calls, D'Bridge will copy the translated
- connect code to a batch file it creates called "PCBBAT.BAT," exit
- with errorlevel 20, and run PCBoard's Board.bat file. When Board.bat
- gets to the "Call PCBBAT" line, it will run PCBBAT, which, if a 2400
- bps MNP caller is online will contain the following command:
-
- PCBOARD /C:3 /ERR
-
- ...which tells pcboard the caller is connected at 2400 bps, and is
- using an error-corrected (MNP) modem. This will allow the caller to
- use protocols such as YModem-G. After the caller exits from PCBoard,
- PCBBAT will return to BOARD.BAT.
-
- Well, that's it! Really fairly simple, and it works very reliably.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.05 PHOENIX BBS
- 194
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.05 PHOENIX BBS
-
- D'Bridge is completely compatible with the Phoenix BBS system, through
- version 1.36rt. In order to configure D'Bridge to work with Phoenix,
- follow the steps below:
-
- 1) In the Phoenix configuration, set the "Use PRENM (or equivalent front-end
- mailer) setting to 'Y'. This will let phoenix know you are running D'Bridge
- and cause Phoenix to exit with a errorlevel 200 when a user logs off.
-
- /-----------------------------------------------------------------------------\
- | PHOENIX Remote Communications System Configuration Program |
- \-----------------------------Press F1 for Help-------------------------------/
-
- Operational Defaults
- | |
- | Display System Status Report after every caller?... N |
- | Use modem when using ALT-R or HOME?................ N |
- | If so, Y = Busy modem, N = Disable answering.... N |
- | Busy modem when using ALT-D?....................... Y |
- | Use Full Screen mode on startup?................... Y |
- | Use PRENM (or equivalent front-end mailer)?........ Y <--- Set this to 'Y' |
- | Use direct (fast) screen writes?................... Y |
- | Allow more than one copy of PHOENIX to run?........ N |
- | Busy modem when quitting PHOENIX (F10 key)?........ Y |
- | Message must be private until proofed by sysop?.... N |
- | All messages must be public?....................... N |
- | User level sensitive bulletins?.................... N |
- | If so, what menu to use......................... 1 |
- | |
- Press PgDn for the next page
-
-
- Copyright (C) 1989 by The GeneSys Project
-
-
- 2) There are 3 methods for running Phoenix with D'Bridge, however the first
- method, using the PUSH routine, is not recommended since Phoenix takes up
- quite a bit of memory. Using the PUSH method may limit your ability to
- run external doors within Phoenix especially if running under Desqview.
-
- a) Using the DROP method will swap most of D'Bridge to EMS or DISK, then
- load and run Phoenix. Make sure you put the '+' in front of the command
- to start Phoenix, this tells D'Bridge to swap itself to memory. The *B will
- pass the correct baud rate to Phoenix. Here is a example:
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.05 PHOENIX BBS
- 195
- --------------------------------------------------------------------------------G
-
-
-
- /----------------------------------------------------------------------------\
- | DOS commands for BBS: cd\phoenix |
- | +phoenix -b*B |
- | |
- \----------------------------------------------------------------------------/
-
- b) When using the EXIT method, D'Bridge must be run from a batch file. See the
- example, RUNDB.BAT below. This method is the best way to conserve memory and
- is easy to setup, especially if you already use a batch file to run D'Bridge.
- Put the following in the DOS BBS command area:
-
- /----------------------------------------------------------------------------\
- | DOS commands for BBS: Echo PHNX -b*b > c:\phoenix\dobbs.bat |
- | *X150 |
- | |
- \----------------------------------------------------------------------------/
-
- The example above writes a file called DOBBS.BAT containing the commands to
- run Phoenix, via a batch file called PHNX.BAT (see the example below). The *b
- is replaced with the callers baud rate. After the batch file is created,
- D'Bridge will exit with a errorlevel 150, which will call the label named BBS.
- The listing below is an example of the batch file which will load D'Bridge and
- start the BBS when a call is received.
-
- RUNDB.BAT EXAMPLE
- -----------------
-
- @echo off
- cls
- set dbridge=c:\db
- set phoenix=c:\phoenix
- :START
- c:
- cd\db
- XU CAPTURE:OFF FIFO:OFF LOCK:0:OFF PORT:0:OFF
- db
- if errorlevel 150 goto bbs
- if errorlevel 0 goto end
- goto end
-
- :BBS
- cd\phoenix
- dobbs.bat <--- This is the batch file created above by D'Bridge. It will
- goto end contain something like 'Phnx -b2400', if the caller called
- at 2400 baud.
- :END
-
- When DOBBS.BAT is ran, it will run the batch file PHNX.BAT and pass along the
- baud rate as -b2400 in the %1 variable. Phoenix will interpret the variable
- when loading.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.05 PHOENIX BBS
- 196
- --------------------------------------------------------------------------------G
-
-
-
-
- PHNX.BAT EXAMPLE
- ----------------
-
- @echo off
- cls
- :START
- cd\phoenix
- XU CAPTURE:ON FIFO:15 LOCK:0:19200 PORT:0:ON
-
- Phoenix %1 <- The %1 will be -b2400
- if errorlevel 200 goto loaddb <- When the user logs off, Phoenix will exit
- if errorlevel 0 goto exit with a errorlevel 200.
- goto end
-
- :LOADDB
- cd\db
- rundb <- This is were you re-load D'Bridge for the
- goto end next call.
-
- :END
-
- IMPORTANT NOTES:
-
- Phoenix versions 1.07 through 1.36rt will only support locked baud rates up
- to 19200 baud, so make sure you do not lock your fossil any higher. If you
- have an error correcting modem, you may pass along the /ARQ connect to
- Phoenix. If your modem returns something other then /ARQ, Phoenix will not
- operate, but you can use the "CONNECT" commands section in the Comm/Modem
- setup in D'Bridge to translate these strings. Here is an example:
-
- "CONNECT" commands: 2400 CONNECT 2400/MNP|CONNECT 2400/ARQ
- 9600 CONNECT 9600/MNP|CONNECT 9600/ARQ
-
- That's all there is to it. Of course you may want to add other errorlevels in
- both the RUNDB.BAT and the PHNX.BAT file to handle errors, mail, and various
- doors.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.06 QUICKBBS
- 197
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.06 QUICKBBS
-
- D'Bridge has specific support for QuickBBS that allows both NETmail and
- ECHOmail operation smoothly and efficiently. Follow these simple steps
- to configure QuickBBS and D'Bridge together:
-
-
- 1) If you wish to the QuickBBS format for your NETmail area, specify
- the QuickBBS message area number to use on the DIRECTORY PATHS
- screen.
-
-
- 2) Define a QuickBBS path in the DIRECTORY PATHS screen. This path
- should be set to the directory QuickBBS uses for its message base
- files.
-
-
- 3) Define all your local and ECHOmail areas using the LOCAL/ECHOMAIL
- AREAS screen. Make sure you define ALL areas, or D'Bridge could
- auto-assign a new ECHO using an already existing message area
- number.
-
-
- 4) There are three methods for running QuickBBS under D'Bridge:
-
-
- a) Using the PUSH method, D'Bridge "spawns" the QuickBBS program;
- this is the fastest way, but requires the most memory. To
- configure this, specify the following in the DOS BBS COMMANDS
- window:
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \QUICKBBS |
- | QUICKBBS -B*B -T*T -E0 |
- | |
- \---------------------------------------------------------/
-
-
- b) Using the DROP method is almost identical. This way, D'Bridge
- swaps its memory to EMS or disk, then runs QuickBBS. Simply put
- a plus sign "+" in front of the QuickBBS command like this:
-
- /---------------------------------------------------------\
- | DOS commands for BBS: CD \QUICKBBS |
- | +QUICKBBS -B*B -T*T -E0 |
- | |
- \---------------------------------------------------------/
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.06 QUICKBBS
- 198
- --------------------------------------------------------------------------------G
-
-
-
-
- c) Using the EXIT method, D'Bridge must be run from a batch file.
- This requires some understanding of DOS, since your system will
- be setup slightly different than our example. Put the following
- in the DOS BBS commands field:
-
-
- /------------------------------------------------------------\
- | DOS commands for BBS: ECHO CD \QUICKBBS >BBS.BAT |
- | ECHO QUICKBBS -B*B -T*T -E0 >>BBS.BAT|
- | ECHO CD \DB >>BBS.BAT |
- | ECHO RUN-DB.BAT >>BBS.BAT |
- | *X20 |
- \------------------------------------------------------------/
-
-
-
- Create a batch file called RUN-DB.BAT containing at least
- the following:
-
-
- ECHO OFF
- :START
- C:
- CD \DB
- DB
- IF ERRORLEVEL 20 GOTO LOADBBS
- GOTO END
-
- :LOADBBS
- BBS.BAT
-
- :END
- EXIT
-
-
- To start D'Bridge, simply type RUN-DB from the D'Bridge root
- directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 199
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.07 REMOTEACCESS
-
-
- D'Bridge is completely compatible with RA (all versions). In order
- to configure RA with DB follow these simple steps.
- First off, define all the errorlevels in the RemoteAccess Configuration
- for the baudrates passed back to RA from D'Bridge via the *X command.
- Only Local, 300, 1200, 2400, 4800 and 9600 need to be defined.
- The others are shown for the sake of completeness.
-
-
-
- File System Options Modem
-
- | Messages |
- Errorlevels | Files |
- | | | Restrictions |
- | Local 99 | | Errorlevels |
- | 300 3 | | Display |
- | 1200 12 | | Colours |
- | 2400 24 | | Paging |
- | 4800 48 | | New users |
- | 7200 72 | | System |
- | 9600 96 | RemoteA| Prompts |10
- | 12000 120 | | Printer |
- | 14400 144 |ght (C) 1991 Andr ntine
- | 19200 192 |
- | 38400 38 | All Rights Reserved
- | |
-
-
-
-
-
-
- In the BBS CONFIGURATION, set up the various files and the DOS commands
- for the BBS. In this configuration, the *X will pass the baudrate/100
- back to RA as an errorlevel. The first lines in the DOS Commands will
- create a DOBBS.BAT file in the RA System Directory which RA will read
- on the swap back from D'Bridge to RA. This one line file, created on
- the fly will contain the Serial Port number, baud rate, time in minutes
- to next mail event and the 'RAW' connect string from the modem.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 200
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- /BBS CONFIGURATION--------------------------------------------------------
- | BBS software installed? Yes
- | "EMAIL calls only" text: Please hang up... Accepting EMAIL calls only.
- | "Press ESC for BBS" text: Press the ESC key twice to access the BBS.
- | "Loading BBS" text: BBS now loading - Please wait...
- | "Loading BBS" file: C:\TEXT\LOADING.ASC
- | "Human" caller timeout: 20
- | BBS online hours: 24 hours
- | "After hours" file: C:\TEXT\HOURS.ASC
- | Minimum baud rate: 1200
- | "Too slow" file: C:\TEXT\TOO_SLOW.ASC
- | Scan ECHOmail after call? No
- | DOS commands for BBS: echo EXEBBS *P *B *T *C >c:\ra\dobbs.bat
- | rem XU Capture:On Dv:On Fifo:15 Port:0:On
- | Bnu_170 /I=0+ /Z0 /C
- | *X
-
-
- The Dos Commands above show how either of the X00 or BNU fossils would
- be initialized prior to RemoteAccess using them on the swap back to RA
- from D'Bridge. Full information on the use of X00 or BNU will be found
- in the respective distribution archives of the Fossils.
-
-
- These raw connect strings could be...
-
- "CONNECT 2400", "CONNECT 9600/ARQ/HST/HST/V42BIS", "CONNECT 2400/REL"
-
- ...or any of the many forms the connect strings could be. RA will search
- this raw connect string in the DOBBS.BAT file for the /ARQ or /REL or
- whatever you define in the RA configuration to indicate a MNP or error
- correcting session is in operation. This is shown on the following page
- by a screen shot from the configuration program of RA:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 201
- --------------------------------------------------------------------------------G
-
-
-
-
- File System Options Modem Manager
-
- | Options |
- | Commands |
- Modem responses
- | |
- | Init OK |
- | Busy OK |
- | Ring RING |
- | Secure /ARQ |
- | 300 CONNECT| |
- | 1200 CONNECT 1200 |
- | 2400 CONNECT 2400 |
- Cop| 4800 CONNECT 4800 |re
- | 7200 CONNECT 7200 |
- | 9600 CONNECT 9600 |
- | 12000 CONNECT 12000 |
- | 14400 CONNECT 14400 |
- | 19200 CONNECT FAST |
- | 38400 CONNECT FASTER |
- | |
-
-
- -----------------------------------------------------------------------
- Modem's response to indicate an error-free connection, eg. /ARQ
-
- For a local logon to RA via D'Bridge, define a function key that will create
- an errorlevel equal to the errorlevel defined in the RA configuration shown
- above. In this case, errorlevel 99 is used and function key 10 ( F10 ).
- It will be noticed that a new DOBBS.BAT file is created as this will override
- the previous inbound human caller one that remain. It can be seen that the
- 180 ( mins to mail event ) is hard coded, but this can be replaced by the
- *T parameter if you so wish... Do you really want your own BBS to throw you
- off of it ?.....
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 202
- --------------------------------------------------------------------------------G
-
-
-
-
- /FUNCTION KEYS----------------------------------------------------------------
- | On this screen, you may define what DOS commands the function keys will run.
- |
- | F2: List e:\fd\logs\dbridge.log
- | F3: List c:\logs\inbound.log
- | F4: List c:\logs\echomail.log
- | F5: List c:\text\last50.asc
- | F6: List c:\text\usa_rprt.asc
- | F7: Cd\qbbs
- | F8: +x
- /F10:-------------------------------------------------------------------------
- | Echo EXEbbs *P *B 180 *C > C:\ra\dobbs.bat
- | *X99
- \--------------------------------------------------------------------- 34327--
- | ALT-F3: *x103
- | ALT-F4: cd\qbbs
- | ALT-F5: *X105
-
-
- Finally, the Modem/Comms set up... this can be a very simple .MCF file and
- set up as no translation is required of the raw connect string from the
- modem to be passed to RemoteAccess. The * ONLY * items that need to be in
- here for most modems - this includes simple 2400 Hayes<tm> types as well as
- the more complicated US Robotics<tm> types - is shown below:
-
- 300 CONNECT
- 1200 CONNECT 1200
- 2400 CONNECT 2400
- 4800 CONNECT 4800
- 9600 CONNECT 9600
-
- A typical MCF file for a USR Courier HST Dual Standard when employed in
- this mode is:
-
- MCF MCDS2384 Miracom DS HST/V32/V42Bis, 38400 baud
- SWITCH 1 0UUDUDUUDUU
- BAUD 38400
- LOCKED
- PREINIT ATZ
- INIT ~ATZ
- OFFHOOK ATM0H1
- ANSWER ATA
- DELAY 50
- TIMEOUT 45
- DIAL 300 ATD
- DIAL 1200 ATD
- DIAL 2400 ATD
- DIAL 4800 ATD
- DIAL 9600 ATD
- DIAL 19200 ATD
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 203
- --------------------------------------------------------------------------------G
-
-
-
-
- /COMMUNICATION PARAMETERS--------------------------------------------------
- |
- | Port Base/IRQ Status Ident MCF name Description
- | DATA/1 COM1 03F8 4 OK 1442 MCDS3384 Miracom DS HST/V32/V42B
- | DATA/2
- | DATA/3
- |
- | Answering method: Hardware (RI signal, pin 22)
- | Line assignment: N/A
- | CostGuard limits: 80 (minutes) 5.00 (cost)
- | Collision detection: Hardware
- | DimeSaver enabled? Yes
- | Auto-Initialization: 5 (minutes)
- | Busy when offline? Yes
- | Touch-tone dialing? Yes
- | Maximum rings: 5
- | "Flag" dial: HST ATB1D
- | Specific dial: 2:281/507 ATB0D
- | Printer device: C:\Dbridge\Dbridge.Out
- | PCF name: EPSONFX Epson FX series
- |
-
-
- There is no need for anything else.... D'Bridge does not need to know
- you have MNP, SYNC or any other error correcting protocol. D'Bridge only
- needs to know the baud rate.. the connect strings like in the examples
- below are not required :
-
- 9600 CONNECT 9600/ARQ/HST/HST/V42BIS
- 9600 CONNECT 9600/ARQ/V32/LAPM/V42BIS
-
- The raw connect string from the modem will be passed to RA as is with
- no translation.
-
- Finally, the batch file that runs the whole lot.... this need not be
- complicated or a difficult task to perform.
-
- This batch file is based on the following assumptions.
-
- 1. RemoteAccess's "Shell to Mailer" function is employed. This is
- fully detailed in the RemoteAccess Documentation, but briefly
- D'Bridge is loaded as an external task within RA whilst RA is
- in itself swapped out to disk with a small kernel remaining
- in memory. This method has the advantage that when an inbound
- human call is detected, D'Bridge exits back to RA and only has
- to swap itself back into memory without performing an initiali-
- zation etc.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 204
- --------------------------------------------------------------------------------G
-
-
-
- 2. All netmail is tossed to a Fido *.Msg type message area and not a
- QBBS type area.
-
- 3. Users of the BBS have their own Netmail Area of which utilities
- like MailToss/Mailscan or Mbutil will transfer any necessary
- messages to/from the Fido type *.Msg Netmail area and the main
- message base.
-
-
- :START
- Set PATH=c:\;c:\dos;c:\ra;c:\db;.........
- Set DB=C:\Db
- Set RA=C:\Ra
- Rem -----------------------------------------------------------------
- Echo De-Init The Fossils Prior To Loading DB via RA.
- Rem -----------------------------------------------------------------
- BNU_170 /I=0-
- Rem XU Port:0:Off
- Rem -----------------------------------------------------------------
- Echo Use Ra's Shell To Mailer Option
- Rem -----------------------------------------------------------------
- CD\RA
- Ra -m\Dbridge\Db.Exe*M
- Rem
- Rem Note the '*M' has NO space between the DB.EXE and the *M
- Rem ie, 'DB.EXE *M' will not cause a RA swap out properly
- Rem -----------------------------------------------------------------
- Echo Errorlevels For Events Issued By D'Bridge
- Rem -----------------------------------------------------------------
- If Errorlevel 126 Goto MIDNITE2
- If Errorlevel 125 Goto MIDNITE1
- If Errorlevel 124 Goto MAIL_IN
- If Errorlevel 122 Goto MAINT
- Rem -----------------------------------------------------------------
- Echo Function Key Issued Error Levels From D'Bridge
- Rem -----------------------------------------------------------------
- If Errorlevel 102 Goto FILESUPD
- Rem -----------------------------------------------------------------
- Rem This is Errorlevel 0 issued by D'Bridge via the ALT-X
- Rem with 10 added by RA
- Rem -----------------------------------------------------------------
- If Errorlevel 10 Goto EXIT
- Rem -----------------------------------------------------------------
- Rem These Errorlevel are issued By RA and
- Rem are fully explained in the RA documentation
- Rem -----------------------------------------------------------------
- If Errorlevel 5 Goto NET_Echo
- If Errorlevel 4 Goto ECHO_ONLY
- If Errorlevel 3 Goto NET_ONLY
- If Errorlevel 2 Goto EXIT
- Goto AFTER_2
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 205
- --------------------------------------------------------------------------------G
-
-
-
-
- :MAIL_IN
- Rem < you may want to run MsgTrack or TrackM in here on inbound >
- < received Netmail if you use a *.Msg type Netmail Area >
-
- If Exist C:\Db\Dbridge.Nmw Mbutil Import -Users
- Goto START
-
- :MIDNITE2
- Rem < various user stats programs run here >
- Goto START
-
- :MIDNITE1
- Rem < Generate my All Files listing maybe >
- Goto START
- :MAINT
- Rem < Daily maintenance routines >
- Goto START
- :FILESUPD
- Rem < run my file forwarding facilities >
- Goto START
- :NET_ECHO
- Rem -----------------------------------------------------------------
- Rem Force A D'Bridge NetMail Rescan For Forwarding/Packing
- Rem -----------------------------------------------------------------
- Cd\Ra
- ECHO > C:\DB\DBRIDGE.RSN
- MBUTIL Export -All
- :ECHO_ONLY
- Rem -----------------------------------------------------------------
- Rem Force A D'Bridge EchoMail Rescan For Forwarding/Packing
- Rem -----------------------------------------------------------------
- ECHO > C:\DB\DBRIDGE.RSE
- Goto AFTER_2
- :NET_ONLY
- Rem -----------------------------------------------------------------
- Rem Force A D'Bridge NetMail Rescan For Forwarding/Packing
- Rem -----------------------------------------------------------------
- CD\Ra
- ECHO > C:\DB\DBRIDGE.RSN
- MBUTIL Export -All
- :AFTER_2
- Rem < After human call user stats programs etc >
- Goto START
-
- :EXIT
- Rem
- CD\
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.07 REMOTEACCESS
- 206
- --------------------------------------------------------------------------------G
-
-
-
-
- Extensive use of some D'Bridge flag/semaphore files has been made in the
- above batch file example. Briefly, they are:
-
- If a DBRIDGE.NMW exists, there has been a New Netmail arrival that
- has not been read by you with the D'Bridge Editor.
-
- If you create a DBRIDGE.RSN, this will cause D'Bridge to repack the
- Outgoing Netmail according to the event in operation at the time and
- rebuild the queue.
-
- If you create a DBRIDGE.RSE, this will cause D'Bridge to scan the
- echomail areas and export/pack any outgoing Echomail messages. This
- will also cause a queue rebuild to occur.
-
- Although use of a program called MBUTIL (by Gerard van der Land) is shown
- above, this in no way endorses the use of this program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.08 SUPERBBS
- 207
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.08 SUPERBBS
-
- D'Bridge has specific support for QuickBBS allowing both NETmail and
- ECHOmail operation smoothly and efficiently. Because SuperBBS is fully
- compatible to the QuickBBS message base format you can follow these simple
- steps to configure SuperBBS and D'Bridge together. Every time you read
- QuickBBS area number or Quick directory path in D'Bridge just think it's
- the same meaning in SuperBBS :
-
-
- 1) If you wish to the SuperBBS format for your NETmail area, specify
- the SuperBBS message area number to use on the DIRECTORY PATHS
- screen.
-
- /----------------------------------------------------------\
- | QuickBBS area number : 1 |
- \----------------------------------------------------------/
-
- 2) Define a SuperBBS path in the DIRECTORY PATHS screen. This path
- should be set to the directory SuperBBS uses for its message
- base files.
-
-
- /----------------------------------------------------------\
- | ... |
- | Quick directory path : C:\SUPERBBS\ |
- | ... |
- \----------------------------------------------------------/
-
-
- 3) Define all your local and ECHOmail areas using the LOCAL/ECHOMAIL
- AREAS screen. Make sure you define ALL areas, or D'Bridge could
- auto-assign a new ECHO using an already existing message area
- number.
-
- /----------------------------------------------------------\
- | ... |
- | Storage: QuickBBS (Fido/QuickBBS/None) |
- | QuickBBS area #: 2 |
- | ... |
- \----------------------------------------------------------/
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.08 SUPERBBS
- 208
- --------------------------------------------------------------------------------G
-
-
-
-
- 4) There are three methods for running SuperBBS under D'Bridge:
-
- a) Using the PUSH method, D'Bridge "spawns" the SuperBBS program;
- this is the fastest way, but requires the most memory. To
- configure this, specify the following in the DOS BBS COMMANDS
- window:
-
- /----------------------------------------------------------\
- | DOS commands for BBS: CD \SUPERBBS |
- | BBS -N1 -B*B -E0 -P1 -O80000 -T*T |
- | |
- \----------------------------------------------------------/
-
- -Nx specify the line number of your multiline BBS*
- -Px specify the com port you use for this line*
- -Ox specify the overlay buffer*
-
- * for more details have a look at the SuperBBS manual
-
- b) Using the DROP method is almost identical. This way, D'Bridge
- swaps its memory to EMS or disk, then runs SuperBBS. Simply put
- a plus sign "+" in front of the SuperBBS command like this:
-
- /----------------------------------------------------------\
- | DOS commands for BBS: CD \SUPERBBS |
- | +BBS -N1 -B*B -E0 -P1 -O80000 -T*T |
- | |
- \----------------------------------------------------------/
-
- c) Using the EXIT method, D'Bridge must be run from a batch file.
- This requires some understanding of DOS, since your system will
- be setup slightly different than our example. Put the following
- in the DOS BBS commands field:
-
- /-----------------------------------------------------------------------\
- | DOS commands for BBS: ECHO CD \SUPERBBS >BBS.BAT |
- | ECHO BBS -N1 -B*B -E0 -P1 -O8000 -T*T >>BBS.BAT |
- | ECHO CD \DB >>BBS.BAT |
- | ECHO RUN-DB.BAT >>BBS.BAT |
- | *X20 |
- \-----------------------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.08 SUPERBBS
- 209
- --------------------------------------------------------------------------------G
-
-
-
-
- Create a batch file called RUN-DB.BAT containing at least
- the following:
-
- ECHO OFF
- :START
- C:
- CD \DB
- DB
- IF ERRORLEVEL 20 GOTO LOADBBS
- GOTO END
- :LOADBBS
- BBS.BAT
-
- :END
- EXIT
-
- To start D'Bridge, simply type RUN-DB from the D'Bridge root
- directory.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.09 SEARCHLIGHT BBS
- 210
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.09 SEARCHLIGHT BBS
-
- Searchlight Bulletin Board System is available from Searchlight
- Software and written by Frank LaRosa. It is noted for it's
- excellent ability to run under DESQView and requires little
- memory to function properly. Searchlight is also an extremely
- good BBS system with D'Bridge as it doesn't require the use of a
- fossil driver except for certain doors. Follow the following
- steps:
-
- 1) Configuring Searchlight.
-
- First, call up Searchlight's CONFIG.EXE program and go to
- General Setup Menu #2 and configure as follows.
-
- Searchlight BBS General Setup Menu #2
-
- 1. Screen write Method ........... Direct
- 2. Idle Time Limit ............... 5
- 3. Quotes File ................... On
- 4. Return to DOS on Logoff ....... Yes
- 5. Hangup Phone on Logoff ........ No
- .
- .
-
- Number 4 is the important one here. Be sure to have this set
- to Yes so that the BBS will exit back to D'Bridge. Now, hit
- escape and go down to the Communications Setup.
-
- Searchlight BBS Communications Setup
-
- 1. Comm Port ..................... 1
- 2. Support 300 Baud .............. No
- 3. Support 1200 Baud ............. Yes
- 4. Support 2400 Baud ............. Yes
- 5. Support 4800 Baud ............. Yes
- 6. Support 9600 Baud ............. Yes
- 7. Support 19200 Baud ............ Yes
- 8. Remote Init String ............ ATH0M0H1!
- 9. Local Init String ............. ATH1!
- 10. Baud Detect Method ............ Modem Msg
- 11. Locked Baud Rate .............. 19200
- 12. Hardware Flow Control ......... On
- 13. Output Buffering Factor ....... 0
- 14. Buffer Door Programs? ......... No
- 15. Com Port Setup [...]
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.09 SEARCHLIGHT BBS
- 211
- --------------------------------------------------------------------------------G
-
-
-
- This is a setup for a 9600 V.32 modem. Set the support for
- your modem type as indicated. The Remote init is set to put
- the modem on-hook and then take it off-hook again. This will
- allow for any additional processing (such as EchoMail export)
- after the caller is offline and still not allow another caller
- to try and call during processing.
-
- 2) Configuring D'Bridge
-
- There are three ways you can run Searchlight under D'Bridge.
-
- OPTION A - The PUSH Method
-
- With the PUSH method, D'Bridge stays in memory and uses any
- additional memory for the BBS, spawning it from a batch
- file or directly. This is a good method for a board
- without large Door Programs, as it quickly loads the BBS.
-
- a) Enter the following in the DOS BBS COMMANDS window on
- the BBS CONFIGURATION Screen:
-
- /-------------------------------------------------------\
- I DOS commands for BBS: SL.BAT *B I
- I I
- I I
- I I
- \-------------------------------------------------------/
-
- b) Create a batch file called SL.BAT in the D'Bridge root
- directory or in the path. You can use the following
- example:
-
- @Echo off
- cd\bbs
- slbbs %1
- exit
-
- OPTION B - The DROP Method.
-
- This option is similar to "A" except that D'Bridge swap
- almost all of it's RAM to EMS or disk, depending on
- configuration. This is a good method for BBS's with large
- Doors and EMS or a fast hard drive. The only difference is
- in the DOS BBS COMMANDS window:
-
- /-------------------------------------------------------\
- I DOS commands for BBS: +SL.BAT *B I
- I I
- I I
- I I
- \-------------------------------------------------------/
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.09 SEARCHLIGHT BBS
- 212
- --------------------------------------------------------------------------------G
-
-
-
- OPTION C - The EXIT Method.
-
- With this option, D'Bridge completely removes itself from
- memory before the BBS loads. To run this method properly,
- D'Bridge must be run from a continuous batch file. Follow
- the configuration shown.
-
- a) Enter the following commands in the DOS BBS COMMANDS
- window on the BBS CONFIGURATION screen:
-
- /-------------------------------------------------------\
- I DOS commands for BBS: ECHO CD\BBS >BBS.BAT I
- I ECHO SLBBS *B >>BBS.BAT I
- I ECHO EXIT >>BBS.BAT I
- I *X20 I
- \-------------------------------------------------------/
-
- b) Create a batch file to run D'Bridge using the following
- example. Start D'Bridge from now on with this batch
- file, usually by calling it from your AUTOEXEC.BAT file:
-
- @ECHO OFF
- :BEGIN
- CD\DB
- DB.EXE
- IF ERRORLEVEL 20 GOTO BBS
- GOTO END
-
- :BBS
- CALL BBS.BAT
- CALL EXPORT.BAT
- GOTO BEGIN
-
- :END
- EXIT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.10 TBBS
- 213
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.10 TBBS
-
- TBBS is a very popular commercial bulletin board system available from
- eSoft.
-
- Current versions of TBBS are designed to work with the SEAdog electronic
- mail system by System Enhancement Associates. For TBBS users to enter
- NETmail, a SEAdog-style nodelist is required; D'Bridge does not create
- a compatible nodelist format. You must either use SEAdog's utilities or
- a third-party nodelist processor to create this list. It is not our
- intention of supporting multiple nodelist formats.
-
- There are two versions of TBBS: Single- and multi-line. Both versions
- use the same file formats, but only the Single-line version is capable
- of using D'Bridge as a front-end mailer. If you wish to use the multi-
- line version of TBBS, you will have to run D'Bridge for nightly mail
- events and transfer mail only during designated times. The configuration
- of D'Bridge is different for bother versions of TBBS.
-
- If you are using the TBBS MULTI-LINE version perform the following
- steps:
-
-
- a) Using a standard text editor such as EDLIN, create a
- batch file similar to the following:
-
- :TOP
- CD \TBBS
- MLTBBS /U
- IF ERRORLEVEL 25 GOTO MAILER
- GOTO END
-
- :MAILER
- CD \DB
- DB
- GOTO TOP
-
- :END
- EXIT
-
-
- b) Using the CEDIT program, set an external event at the time
- you want to run D'Bridge, by exiting with errorlevel 25.
- For more details about CEDIT, see Chapter 5 of your
- TBBS manual.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.10 TBBS
- 214
- --------------------------------------------------------------------------------G
-
-
-
-
- c) Using the D'Bridge SCHEDULE MAINTENANCE screen, create the
- desired MAIL events plus an EXIT event directly following
- with an errorlevel of 10. In the above batch file, error-
- level 10 means to re-load TBBS.
-
-
- d) To run the system, just start the batch file. TBBS will
- execute and run D'Bridge at the designated time.
-
-
-
-
- If you are using the TBBS SINGLE-LINE version perform the following
- steps:
-
-
- a) Rename DBMAILER.EXE to MAILER.EXE using the DOS "REN" command:
-
- C> REN DBMAILER.EXE MAILER.EXE
-
- If you are upgrading from a previous version, you might have
- to delete MAILER.EXE before doing this. Make sure you always
- rename this file when you upgrade to a new D'Bridge version.
- The DB.EXE shell program will run MAILER.EXE if the
- DBMAILER.EXE program is not found in the current path.
-
-
-
- b) With a standard text editor, create a batch file similar to
- the following:
-
-
- :TOP
- C:
- CD \TBBS
- TBBSDVR
- TBBS /M
- IF ERRORLEVEL 30 GOTO ECHOSCAN
- GOTO END
-
-
- :ECHOSCAN
- DB UNPACK
- (Put your ECHOmail processing commands here)
- .
- .
- .
- GOTO TOP
-
- :END
- EXIT
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.10 TBBS
- 215
- --------------------------------------------------------------------------------G
-
-
-
-
- c) When D'Bridge is loaded in this manner, odds are there's not
- enough memory free to process ECHOmail, so unpacking should
- be done from on a batch basis.a batch basis; disable the
- internal unpacker by answering "NO" to the UNPACK MAIL field
- on the PACKET/MAIL CONTROL screen.
-
-
- d) For D'Bridge to unpack mail, you must specify DOS COMMANDS
- on the ADVANCED ROUTING screen of the SCHEDULE MAINTENANCE
- system. In each mail event that you want mail unpacked plus
- the UNEVENT, specify the following for DOS COMMANDS:
-
- *X30
-
- After mail is received, D'Bridge will exit with an errorlevel
- of 30; with the above batch file, this will cause TBBS to be
- unloaded and the DB UNPACK option to be run. If you only
- want to unpack mail on a periodic basis, you may accomplish
- this by using "EXIT" events with errorlevel 30 when you want
- the unpacker to be run.
-
-
-
- e) Finally, for D'Bridge to exit to TBBS when a bulletin board
- call is received, specify the following in the DOS BBS
- COMMANDS field on the BBS CONFIGURATION screen:
-
- /--------------------------------------------------------\
- | DOS commands for BBS: *X |
- | |
- | |
- \--------------------------------------------------------/
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.11 TELEGARD
- 216
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.11 TELEGARD
-
- Setting up D'Bridge and Telegard is a snap. First let's look at the
- Telegard aspect of it. From the "P", System Configuration screen, go to
- Modem Configuration:
-
- Modem configuration
-
- 1. Maximum baud rate : 38400 (If you are using 9600 or above)
- 2. COM port number : 2
- 3. Modem init string : "ATZ"
- 4. Modem answer string : "ATA"
- 5. Modem hangup string : "~~~+++~ATH1"
- 6. Modem offhook string: "ATM0H1"
- 7. No-call init time : 30
- 8. COM port locked? : Yes (If you are using 9600 or above)
- 9. Locked COM port baud: 38400 (If you are using 9600 or above)
- R. Modem result codes :
-
- Those are the only real things you need to be worried about in the Modem
- Section. Next goto the FidoNet Configuration:
-
- FidoNet configuration
-
- A. Network address : 1:376/72.0 (Simply your Net/Node/Point)
- B. Origin line : "" (Default that you would like to use as
- an Origin Line)
- C. Strip IFNA kludge lines : Yes 1. Color of standard text : 1
- D. Strip SEEN-BY lines : Yes 2. Color of quoted text : 3
- E. Strip origin line : No 3. Color of tear line : 4
- F. Strip centering codes : Yes 4. Color of origin line : 3
- G. Strip box codes : Yes
- H. Center box/center lines : Yes
- I. Add tear/origin lines : No
- J. Default EchoMail path : "D:\MSG\"
-
- It is not necessary to strip the Seen-By or IFNA kludge lines, but it
- does look better. In 99% of the cases, you will want the centering, and
- box codes all set to YES.
-
- Adding a tear and origin line is all up to you. I choose not too simply
- because I prefer seeing "D'Bridge" at the bottom of the messages that I
- enter in!
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.11 TELEGARD
- 217
- --------------------------------------------------------------------------------G
-
-
-
-
- Setting up the Message bases themselves:
-
- 1. Name : D'Bridge Support
- 2. Filename : DBRIDGE
- 3. Base type : EchoMail
- Message path: D:\MSG\DBRIDGE\
- [...]
- 7. Anonymous : No
- 8. Password : ""
- 9. Address : Default
- C. Colors : Text=1, Quote=3, Tear=4, Origin=3
- M. Mail flags : KS-/CBM-
- O. Origin line : "Windows of the World (WOTW)"
- Flags : R-A
- P-Index : 38
- Q. Quit
-
- Edit menu (?=help) : ?
-
- Toggles:
- (R)eal names (A)Filter ANSI/8-bit ASCII
-
- Edit menu (?=help) :
-
- 1) Simply the description you would like your users to see.
- 2) The filename that you would like Telegard to use to store the
- messages.
- 3) If it is an area that you want to interface with D'Bridge, make
- sure it is set to ECHOmail and the path is the same as that you have
- defined in D'Bridge for the echo.
- 4-6) Removed, it's irrelevant to D'Bridge and Telegard and is all up to
- you.
- 7) Do NOT allow anon. posts. It's against Fido policy!
- 8) Password is up to you if you want on the message base
- 9) If you want an address that is different from your default added to
- the Origin line, enter it in here. (Be sure you also have DB set up
- to use a different address for the individual echo also or it will
- be of little good.
- C) Colors are only relevant to what is seen on the BBS itself
- M) The correspond to the flags you set up in the FidoNet Config above.
- You can set them all individually for each ECHOmail message area.
-
- (K)ludge line strip (B)ox code strip
- (S)EEN-BY line strip (M)ake lines centered
- (O)rigin line strip (T)ear/origin line add
- (C)entering code strip
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.11 TELEGARD
- 218
- --------------------------------------------------------------------------------G
-
-
-
- O) Like most other areas, you can set the origin line to read whatever
- you want.
-
- FLAGS: (R)eal Names -- Always turn this on if it is a
- FidoNet conference
- (A)NSI filter -- ""
-
- That's it from the Telegard half. The D'Bridge side is simple!
-
-
- /BBS CONFIGURATION----------------------------------------------------------\
- | BBS software installed? Yes |
- | "EMAIL calls only" text: Accepting EMAIL calls only. Please hang up... |
- | "Press ESC for BBS" text: Press the ESC key twice to access the BBS... |
- | "Loading BBS" text: |
- | "Loading BBS" file: D:\DB\LOADING.TXT |
- | "Human" caller timeout: 20 |
- | BBS online hours: 05:00 until 03:00 |
- | "After hours" file: F:\DB\FILES\TOOLATE.TXT |
- | Minimum baud rate: |
- | "Too slow" file: |
- | Scan ECHOmail after call? No |
- | DOS commands for BBS: d: |
- | cd\bbs |
- | bnu /I=1+ |
- | +bbs -b*b -q |
- | bnu /I=1- |
- \---------------------------------------------------------------------------/
-
- The only important aspect here is the "DOS commands for BBS"
-
- Make sure D'Bridge changes to the Telegard directory before it
- tries to load it otherwise it won't load!
-
- The BNU line(s) are only relevant if you are going to be using TG
- with a fossil driver. If you are using a 9600 modem or above, I
- STRONGLY recommend you do. The BNU /I=1+ command simply enables the
- driver before the bbs loads and the BNU /I=1- disables it before
- D'Bridge loads back up -- it does not remove it from memory, but
- simply disables it and lets D'Bridge handle the comm port.
- To use these commands, you must have first loaded BNU with all of
- the options you want it to operate with. I do this just before I
- load DB.
-
- the +BBS -B*B -Q line is what loads up Telegard. The -B*B loads TG
- with the connect rate listed after the | in DB's modem setup.
- Since Telegard does nothing different for MNP or ARQ callers, make
- them all 300, 1200, 2400 or 19200, anything else will simply cause
- problems.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.11 TELEGARD
- 219
- --------------------------------------------------------------------------------G
-
-
-
- For the "Drop to DOS method", remove all of the commands in the "DOS
- commands for BBS" section and place "*X" in there place. Below is a
- sample of the batch file I use to run TG from D'bridge:
-
- RUNDB.BAT
-
- REM This is where I load BNU once and only once, the first time DB gets
- REM loaded for the day.
- C:\UTIL\bnu /P=1 /T=10 /R=10 /F+ /L1=38400 /Z0 /M-
- :TOP
- BNU /I=1-
- DB ; Load D'Bridge!
- IF ERRORLEVEL 192 goto 9600BAUD ; BBS caller connected at 19,200 bps
- IF ERRORLEVEL 96 GOTO 9600BAUD ; 9600 Connect
- IF ERRORLEVEL 48 GOTO 4800BAUD ; 4800 Connect
- IF ERRORLEVEL 24 GOTO 2400BAUD ; 2400 Connect
- IF ERRORLEVEL 12 GOTO 1200BAUD ; 1200 Connect
- IF ERRORLEVEL 3 GOTO 300BAUD ; 300 Connect
- IF ERRORLEVEL 0 GOTO END ; You Exited D'Bridge
-
- :300BAUD
- d:
- BNU /I=1+
- CD\BBS
- BBS -b300 -q ; Parameters for Telegard to load at 300 baud and exit
- ; when user logs off
- TELEMAIL SCAN : Telegard Utility to check for new FIDO-NET messages
- ; to be exported, not necessary here
- GOTO TOP ; Return to beginning of batch file and load D'Bridge
- ; again
-
- :1200BAUD
- d:
- BNU /I=1+
- CD\BBS
- BBS -b1200 -q ; Parameters for Telegard to load at 1200 baud and exit
- ; when user logs off
- TELEMAIL SCAN ; Telegard Utility to check for new FIDO-NET messages to
- ; be exported, not necessary here
- GOTO TOP ; Return to beginning of batch file and load D'Bridge
- ; again
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.11 TELEGARD
- 220
- --------------------------------------------------------------------------------G
-
-
-
-
- :2400BAUD
- d:
- BNU /I=1+
- CD\BBS
- BBS -b2400 -q ; Parameters for Telegard to load at 2400 baud and exit
- ; when user logs off
- TELEMAIL SCAN ; Telegard Utility to check for new FIDO-NET messages to
- ; be exported, not necessary here
- GOTO TOP ; Return to beginning of batch file and load D'Bridge
- ; again
-
- :4800BAUD
- d:
- BNU /I=1+
- CD\BBS
- BBS -b4800 -q ; Parameters for Telegard to load at 4800 baud and exit
- ; when user logs off
- TELEMAIL SCAN ; Telegard Utility to check for new FIDO-NET messages to
- ; be exported, not necessary here
- GOTO TOP ; Return to beginning of batch file and load D'Bridge
- ; again
-
- :9600BAUD
- d:
- CD\BBS
- BBS -b19200 -q ; Parameters for Telegard to load at 19200 baud and exit
- ; when user logs off
- TELEMAIL SCAN ; Telegard Utility to check for new FIDO-NET messages to
- ; be exported, not necessary here
- GOTO TOP ; Return to beginning of batch file and load D'Bridge
- ; again
-
-
- The TELEMAIL utilities will need to be found on a Telegard support system,
- or most major bbses. (1:376/72 has them!)
-
- The only other thing you might need is to add a command to get any received
- echomail into Telegard. You would want to do that either as an event or as
- a "DOS command after mail received" in all of your events. In either case,
- the commands would be:
-
- D: 'Change to the drive where the BBS is located
- CD \BBS 'Change to the BBS directory
- TELEMAIL TOSS 'Toss any new echomail into Telegard
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.12 WILDCAT
- 221
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 8.12 WILDCAT
-
- Wildcat bulletin board system is available from Mustang Software; it is
- an excellent menu-driven BBS that runs well with D'Bridge. In order to
- configure Wildcat and D'Bridge together, follow these steps:
-
-
-
- 1) Configure Wildcat's MODEM INFORMATION screen as follows. This uses
- the US Robotics HST as an example. If you use a different modem,
- the parameters may vary. Leave all the initialization fields blank
- or Wildcat will send the strings to the modem. Wildcat receives the
- caller already online after D'Bridge answers the call.
-
-
-
- /-----------------------------------------------------------------------------\
- | MODEM INFORMATION - Part 1 Frame 3 |
- | |
- | 1. Which Communications Port do you want to use [ 1 .. 4 ] ? 1 |
- | 2. Maximum # of seconds to wait for carrier [ S7 Register ] ? 1 |
- | 3. Enter the string to reset your modem: |
- | 4. Enter Modem Startup String #1: |
- | |
- | 5. Enter Modem Startup String #2: |
- | |
- | 6. Enter Modem Startup String #3: |
- | |
- | 7. Enter the string to reinitialize your modem after every call: |
- | |
- | 8. Modem Delays in Milliseconds: |
- | #1: 1 #2: 1 #3: 1 |
- | 9. Initialize your modem port at which baud rate [ 300..19200 ] ? 19200 |
- | 10. Lock the DTE setting at the initialized baud rate [Y/N] ? Y |
- | |
- \-----------------------------------------------------------------------------/
-
-
- 2) Wildcat has certain protocols that may only be used if there is an
- error-correcting connection. If you have a modem with MNP, it should
- return a different response string such as MNP, ARQ or RELIABLE.
- D'Bridge needs to translate this code into a string Wildcat will
- understand. Again, this example uses the HST modem; if you do not
- have an error-correcting modem, this setup is acceptable.
- Configure the "CONNECT" COMMANDS field on the COMMUNICATION MODEM
- SETUP screen:
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.12 WILDCAT
- 222
- --------------------------------------------------------------------------------G
-
-
-
-
- /-------------------------------------------------------------------\
- | "CONNECT" commands: 9600 CONNECT 9600|9600 |
- | 2400 CONNECT 2400|2400 |
- | 1200 CONNECT 1200|1200 |
- | 300 CONNECT|300 |
- | 9600 CONNECT 9600/ARQ|9600MNP |
- | 2400 CONNECT 2400/ARQ|2400MNP |
- | 1200 CONNECT 1200/ARQ|1200MNP |
- \-------------------------------------------------------------------/
-
- 3) There are two ways to setup Wildcat under D'Bridge:
-
-
- OPTION "A" - Spawn a batch file using the DROP method
-
- With the DROP method, D'Bridge swaps almost all its used RAM to
- EMS or disk, then "spawns" a batch file that invokes Wildcat.
- If you have available EMS or a fast disk, this is a good method
- to use:
-
-
- a) Enter the following in the DOS BBS COMMANDS window on the
- BBS CONFIGURATION screen:
-
- /--------------------------------------------------------\
- | DOS commands for BBS: +CAT.BAT *C |
- | |
- | |
- \--------------------------------------------------------/
-
-
- b) Create a batch file called CAT.BAT in the D'Bridge root
- directory. Use the following as an example:
-
- IF 1==%live% GOTO RETURNCAT
-
- :WILDCAT
- SET LIVE=
- C:
- CD \WC
-
-
- REM If you want to pass the time to the next event to
- REM Wildcat add a %2 after the %1
- Wildcat /B %1
- IF ERRORLEVEL 60 GOTO END
- IF ERRORLEVEL 35 goto QBBSMAIL
- GOTO END
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.12 WILDCAT
- 223
- --------------------------------------------------------------------------------G
-
-
-
- :RETURNCAT
- C:
- CD \WC
- SET live=
- Wildcat
- IF ERRORLEVEL 60 GOTO END
- IF ERRORLEVEL 35 goto QBBSMAIL
- GOTO END
-
- :QBBSMAIL
- C:
- CD \QUICKBBS
- WC2QBBS C:\WC\CALLINFO.BBS
- QUICKBBS -R -e0
- GOTO RETURNCAT
-
- END:
- EXIT
-
-
-
-
- OPTION "B" - Run D'Bridge from a batch file and EXIT
-
- With the EXIT method, D'Bridge is completely removed from memory
- when Wildcat takes control. This method requires D'Bridge to be
- run from a batch file. Following is a description of how to
- configure the software for this method:
-
-
-
- a) Enter the following in the DOS BBS COMMANDS window on the
- BBS CONFIGURATION screen:
-
- /--------------------------------------------------------\
- | DOS commands for BBS: ECHO SET baud=*C >BBS.BAT |
- | ECHO SET live=2 >>BBS.BAT |
- | ECHO RUN-DB.BAT >>BBS.BAT |
- | *X96 |
- \--------------------------------------------------------/
-
-
- b) Create a batch file called RUN-DB.BAT using the following
- model as an example. Start D'Bridge by using this batch
- file, most-likely by calling it directly from AUTOEXEC.BAT:
-
-
- ECHO OFF
- :START
- CLS
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 8.12 WILDCAT
- 224
- --------------------------------------------------------------------------------G
-
-
-
- IF 1==%live% GOTO RETURNCAT
- IF 2==%live% GOTO WILDCAT
- SET LIVE=
- SET BAUD=
- C:
- CD \DB
- DB
- IF ERRORLEVEL 96 GOTO LOADBBS
- GOTO END
-
- :WILDCAT
- SET live=
- C:
- CD \WC
- Wildcat /B %baud%
- IF ERRORLEVEL 35 GOTO QBBSMAIL
- GOTO START
-
- :LOADBBS
- BBS.BAT
-
- :RETURNCAT
- C:
- CD \WC
- SET live=
- Wildcat
- IF ERRORLEVEL 35 GOTO QBBSMAIL
- GOTO START
-
- :QBBSMAIL
- C:
- CD \QUICKBBS
- WC2QBBS C:\WC\CALLINFO.BBS
- QUICKBBS -R -e0
- GOTO RETURNCAT
-
- END:
- EXIT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 225
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- 9.00 GLOSSARY OF TERMS
-
-
-
-
-
- ADDRESS
-
- An GADDRESSH normally specifies where you want to send EMAIL or files.
- D'Bridge uses the Fidonet addressing structure; this consists of four
- numbers: ZONE, NET, NODE and POINT. For example, my ADDRESS is 1:110/68.
- This means ZONE 1, NET 110, NODE 68 and POINT 0. The format for a Fidonet
- ADDRESS is: GZONEH:GNETH/GNODEH.GPOINTH.
-
-
-
-
- ALIAS
-
- An GALIASH is simply another ADDRESS or USER NAME you are using at any given
- time. Your system will have a primary ADDRESS and OPERATOR, but you may also
- specify a list of AKA (Also Known As) ADDRESSES and USER NAMES which may be
- selected while using the internal message editor. ALIAS ADDRESSES are used
- when your system belongs to more than one network.
-
-
-
-
- AREAFIX
-
- GAREAFIXH is a subsystem with D'Bridge allowing remote systems to add and
- delete ECHOmail conferences from your forwarding list. This eliminates the
- need for routine maintenance by the operator of an ECHOmail hub.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 226
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ATOMIC CLOCK
-
- The GATOMIC CLOCKH is a type of clock that uses certain resonance frequencies
- of atoms to keep time with extreme accuracy. The electronic components of
- ATOMIC CLOCKS are regulated by the frequency of the microwave electromagnetic
- radiation emitted or absorbed by the quantum transition (energy change) of an
- atom or molecule. In an ATOMIC CLOCK these quantum transitions produce
- extremely regular waves of electromagnetic radiation; like the recurrent
- events in other types of clocks, these waves are then counted.
- Th cesium-beam ATOMIC CLOCK is the most accurate standard of ATOMIC TIME
- and frequency. In 1967 the 13th General Conference on Weights and Measures
- redefined the SI unit of time, the second, in terms of the cesium standard
- so as to equal the second of EPHEMERIS TIME. The Conference defined the
- second as 'the duration of 9,192,631,770 periods of the radiation corres-
- ponding to the transition between the two hyperfine levels of the ground
- state of the cesium-133 atom'.
-
-
-
-
- ATOMIC TIME
-
- GATOMIC TIMEH is a time scale generated by ATOMIC CLOCKS, which furnish time
- more accurately than was possible with previous astronomical means (measure-
- ments of the rotation of the Earth and its revolution about the Sun). INTER-
- NATIONAL ATOMIC TIME (abbreviated TAI, from the name in French) is based on a
- system consisting of about six primary, laboratory-constructed, cesium-beam
- ATOMIC CLOCKS along with a larger number of secondary, commercially made
- cesium clocks. Signals from these ATOMIC CLOCKS are transmitted to the In-
- ternational Time Bureau at Paris, which uses them to form TAI. It is estima-
- ted that the second of TAI reproduces the SI second to within about 1 part
- in 100,000,000,000,000. Two clocks that differ in rate by this amount would
- drift apart by only three milliseconds in 1,000 years.
-
-
-
-
- BAUD RATE
-
- The GBAUD RATEH represents the speed of a serial communication line.
- GBAUDH actually means BITS PER SECOND and dictates how fast data can be
- transferred. Since normal data communications takes 10 bits per character,
- a 1200 baud modem can transmit and receive data at a maximum of 120 bytes
- (characters) per second.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 227
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- BBS
-
- GBBSH - An abbreviation for Bulletin Board System.
-
-
-
-
- BOSS
-
- A GBOSSH node refers to the administrator of a "point" network. For example,
- if your address is 1:110/50.6, then your "BOSS" address is 1:110/50 (or point
- zero). Since points are not in the nodelist, the BOSS will normally receive
- and forward all mail addressed to a point.
-
-
-
-
- BULLETIN BOARD SYSTEM
-
- Usually called a BBS, a GBULLETIN BOARD SYSTEMH is a program which allows
- "human" callers to connect using a terminal program and directly access
- messages, files and other online services. Many BULLETIN BOARDS are public-
- access systems which allow people to use them for free providing they follow
- the "rules". Many manufacturers and software companies have set up a BBS
- to handle support and distribute product information. D'Bridge is capable of
- acting as a "front-end" to most BULLETIN BOARD SYSTEMS, determining if a call
- is an EMAIL session or if a "human" is on the line.
-
-
-
-
- CARRIER
-
- GCARRIERH, short for CARRIER WAVE, refers to the connection of two modems.
- When you dial a modem (with your telephone) you will hear a high-pitched tone;
- this is called the CARRIER DETECT SIGNAL. When a modem calls another system,
- the calling modem detects this tone and they automatically "synchronize" and
- determine the baud rate of the connection. Once this is accomplished, you are
- said to have a CARRIER. If the connection is terminated, or the CARRIER signal
- is lost, the modems are no longer communicating and will hang up.
- The CARRIER WAVE in itself is the unmodulated single-frequency electromagnetic
- wave that carries the desired information (data) - i.e., is modulated by the
- information.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 228
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- CD
-
- An abbreviation for Carrier Detect. GCDH refers to the circuits within the
- modem monitoring the connection and detecting when a carrier is lost. Most
- external modems have a CD light telling the operator the status of the
- connection. Once a carrier is detected, D'Bridge can initiate an EMAIL ses-
- sion.
- GCDH also refers to the signal the modem sends to the computer telling it
- that another modem is connected. This signal is required by D'Bridge.
-
-
-
-
- COMM PORT
-
- GCOMM PORTH refers to the serial I/O card used by D'Bridge to communicate with
- the modem. Internal modems have a built-in serial PORT but are used the same
- way. Your modem PORT is most likely called either COM1 or COM2.
-
-
-
-
- COMPILE
-
- In D'Bridge, GCOMPILEH means to translate the raw nodelist or FileBase data
- into its internal database. This must be done every time a new nodelist is
- installed or when the FileBase is updated. When D'Bridge is run, it checks
- the data and time associated with each nodelist file you are using with the
- last known values. If they differ, D'Bridge automatically RECOMPILES the
- nodelist database (the FileBase must be manually COMPILED using the command-
- line option).
-
-
-
-
- CONNECT
-
- GCONNECTH refers to D'Bridge receiving a carrier detect signal from the modem
- along with a "CONNECT" message generated by HAYES-compatible modems. When
- D'Bridge is CONNECTED to another system, it can send and receive EMAIL and
- files. When placing a long-distance call, your phone company will bill you
- for the actual CONNECT TIME, usually rounded up to the next minute.
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 229
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- COORDINATED UNIVERSAL TIME (UTC)
-
- GCOORDINATED UNIVERSAL TIMEH is the international basis of civil and
- scientific time. UTC is widely broadcast by precisely coordinated radio
- signals; the radio time signals ultimately furnish the basis for the
- setting of all public and private clocks. UTC is obtained from ATOMIC
- CLOCKS, and the unit of UTC is the atomic (SI) second.
- UTC serves to coordinate the timekeeping differences that arise between
- ATOMIC TIME (which is derived from ATOMIC CLOCKS) and SOLAR TIME (which is
- derived from astronomical measurements of the Earth's rotation on its axis
- relative to the Sun). UTC is thus kept within an exact number of seconds
- of INTERNATIONAL ATOMIC TIME and is also kept within 0.9 second of the
- SOLAR TIME denoted UT1. Due to the irregular slowing of the Earth's rate
- of rotation by tidal friction and other forces, there is now about one more
- (atomic-clock derived) SI second in a solar year than there are UT1 seconds.
- To remedy this discrepancy, UTC is kept within 0,9 s of UT1 by adding a leap
- second to UTC as needed; the last minute of December or June is made to
- contain 61 seconds. The slowing of the Earth's rotation varies irregularly,
- and so the number of leap seconds by which UTC must be retarded to keep it
- in epoch with UT1 cannot be predicted years in advance. Impending leap
- seconds for UTC are announced at least eight weeks in advance by the Paris
- Observatory, however.
-
-
-
-
- CM
-
- An abbreviation for GContinuous MailH. All D'Bridge systems are capable of this.
- Continuous mail means that a Fidonet-based EMAIL system is capable of
- receiving mail 24 hours a day and not just during a scheduled event. Some
- EMAIL systems are still not capable of this, so the nodelist has a "CM" flag
- which can be used to only send to CM systems (this is configurable on the
- ADVANCED ROUTING screen of SCHEDULE MAINTENANCE).
-
-
-
-
- CRC
-
- GCRCH is an abbreviation for Cyclic Redundancy Check. This is how D'Bridge
- (and all other EMAIL systems) ensure that data is received the same way it
- is transmitted. It is much like a "checksum" attached to a block of data;
- A mathematical formula (a polynomial) is used to compare each data block with
- its CRC value. If there is a difference, the data is not valid and must be
- retransmitted. You, as the user, do not need to concern yourself with this
- as it happens automatically.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 230
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- CRASH
-
- In D'Bridge (and most other Fidonet-based systems), GCRASHH refers to a high-
- priority message. It is an "attribute" that may be associated with a message
- to tell D'Bridge to send the mail immediately, to override any routing and to
- call the destination system directly. Using the internal message editor, you
- can specify any message to have CRASH priority.
-
-
-
-
- CTS
-
- An abbreviation for Clear To Send. GCTSH is a signal generated by the receiving
- system or modem telling D'Bridge that it may transmit data. This is normally
- used only when a modem is using a higher baud rate than it is capable of
- sending (or receiving). The CTS signal is used in conjunction with the RTS
- (Request To Send) signal and is sent from the modem to the computer.
-
-
-
-
- DATA
-
- GDATAH simply means any form of information that can be stored in a computer
- in the form of a file. DATA could be a message, spreadsheet file, graphics
- image or anything else in your computer. Any form of DATA may be sent by
- D'Bridge.
-
-
-
-
- DATA BITS
-
- When D'Bridge is communicating with another EMAIL system, it uses 8 GDATA BITSH
- in the transmission. IBM computers are only capable of using 7 or 8 DATA BITS
- in their communications. The D'Bridge "terminal mode" allows you to select
- either 7 or 8 DATA bits when communicating with online services such as BBS's.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 231
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DAYLIGHT SAVING TIME
-
- GDAYLIGHT SAVING TIMEH, also called summer time, is a system for uniformly
- advancing clocks, especially in summer, so as to extend daylight hours
- during conventional waking time. In the Northern Hemisphere, clocks are
- usually set ahead one hour in late March or in April and are set back one
- hour in late September or in October.
- The practice was first suggested in a whimsical essay by Benjamin Franklin
- in 1784. In 1907 an Englishman, William Willett, campaigned for setting the
- clock ahead by 80 minutes in four moves of 20 minutes each during the spring
- and summer months. In 1908 the House of Commons rejected a bill to advance
- the clock by one hour in the spring and return to GREENWICH MEAN (standard)
- TIME in the autumn.
- Several countries, including Australia, Great Britain, Germany, and the
- United States, adopted summer DAYLIGHT SAVING TIME during World War I to
- conserve fuel by reducing the need for artificial light. During World War II,
- clocks were kept continuously advanced by an hour in some nations - e.g.,
- in the United States from Feb. 9, 1942, to Sept. 30, 1945; and England used
- 'double summer time' during part of the year, advancing clocks two hours
- from the standard time during the summer and one hour during the winter
- months.
- In the United States, DAYLIGHT SAVING TIME formerly began on the last Sunday
- in April and ended on the last Sunday in October. In 1986 the U.S. Congress
- passed a law moving up the start of DAYLIGHT SAVING TIME to the first Sunday
- in April, while keeping its end date the same. In most of the countries of
- western Europe, DAYLIGHT SAVING TIME starts on the last Sunday in March and
- ends on the last Sunday in September. In Britain and many other countries
- worldwide, it lasts from March 30 to October 26.
-
-
-
-
- DEFAULT
-
- A GDEFAULTH refers to a predefined or normal value for something. When you
- first install D'Bridge, you will notice that many of the configuration screens
- already have answers to questions even though you didn't enter them. This is
- because these values or answers will be used by most systems, so they are the
- DEFAULTS.
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 232
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DOMESTIC
-
- GDOMESTICH refers to any communications within a given country. In the case
- of the U.S., D'Bridge considers any system that has a phone number beginning
- with "1" to be a DOMESTIC call (this includes Canada, the Bahamas and possibly some other
- neighboring countries sharing "1" as their country-code).
-
-
-
-
- DOS
-
- GDOSH, an acronym for Disk Operating System, is the program (written by
- MicroSoft) controlling your computer's basic functions. D'Bridge requires
- DOS to operate and odds are (99.99% of the time) you already have this
- program. Other operating systems are available such as PC-MOS and XENIX,
- but D'Bridge will not function while using these.
-
-
-
-
- DOS EVENT
-
- A GDOS EVENTH is a scheduled event (defined by SCHEDULE MAINTENANCE) that will
- execute any number of DOS commands or programs, providing that you have enough
- memory to "spawn" these tasks. DOS EVENTS can be used for any function you
- wish to have automatically performed on a scheduled basis. DOS EVENTS must
- only run programs that require no human intervention (keyboard I/O).
-
-
-
-
- DOWNLOAD
-
- GDOWNLOADH means to receive a file from a remote computer. The D'Bridge
- "terminal mode" supports downloads with XMODEM, SEAlink and ZMODEM protocols.
- When you DOWNLOAD a file, you are basically copying it over the telephone
- from the remote computer to yours. Because these protocols all use CRC error-
- checking, the files should arrive on your computer exactly like they are on
- the remote system.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 233
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DROP
-
- In D'Bridge, GDROPH means to execute another program (or access DOS) by swapping
- all memory to EMS or disk, then executing another program. This method (com-
- pared to PUSH) frees all available memory so that the executed program has
- the maximum memory available for its use.
-
-
-
-
- DUPLEX
-
- GDUPLEXH is used only in the D'Bridge "terminal mode" and refers to an
- operating characteristic of the remote computer you are calling. These
- days, almost all computers and online services operate in FULL DUPLEX
- mode; this means every time you type a character, the remote computer
- "echos" it back to you and it is displayed on your screen. Some systems,
- however, do not "echo" the characters you type; that is called HALF
- DUPLEX operation. If you set D'Bridge to HALF DUPLEX, every character
- you type will be displayed on your screen. If you experience a double
- echo (two characters for every one you type), you should change to FULL
- DUPLEX.
-
-
-
-
- DTR
-
- An abbreviation for Data Terminal Ready. GDTRH is the signal your computer
- sends to your modem stating it should accept commands from the computer or,
- if enabled, answer the phone. D'Bridge requires this signal to function
- properly in order to be able to hang up the phone. When your computer "lowers"
- DTR, your modem should hang up the phone if connected to a remote system, or
- not answer the phone (if so enabled). Most external modems have a DTR light
- telling you the status of this signal.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 234
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- DYNAMICAL TIME
-
- GDYNAMICAL TIMEH is the time scale of dynamical astronomy (celestial
- mechanics). The orbital motions of celestial bodies subject only to Newton's
- laws of motion and law of gravitation, as modified by relativity, proceed as
- a function of DYNAMICAL TIME. In 1952 the International Astronomical Union
- (IAU) defined a dynamical time scale named EPHEMERIS TIME (ET), which is
- based on the Earth's orbital motion as given by the American astronomer
- Simon Newcomb in his nonrelativistic tables of the Sun (1898). In practice,
- however, ET was determined more accurately by observing the Moon's motions
- and then using a lunar ephemeris. For this operation an empirical, non-
- gravitational term was used to correct for the disturbing effect exerted
- by the Earth-Moon tidal couple, as given in the nonrelativistic Improved
- Lunar Ephemeris of 1954.
- Highly accurate observations made since about 1967 by means of radar,
- lasers, radioastronomy, spacecraft, and ATOMIC CLOCKS have since made
- improved, relativistic ephemerides necessary. In 1984 ET was replaced in
- national almanacs by Barycentric Dynamical Time (TDB), whose equations of
- motion refer to the barycentre, or centre of mass, of the solar system and
- include relativistic terms. Different theories of relativity are used in
- the various forms of TDB, and the IAU also defined an auxiliary scale,
- Terrestrial Dynamical Time (TDT), for use in apparent geocentric ephemerides
- (i.e., those using equations of motion referring to the centre of the Earth).
- By definition, TDT = TAI + 32.184 seconds, with TAI denoting INTERNATIONAL
- ATOMIC TIME.
-
-
-
-
- ECHOMAIL
-
- GECHOmailH is a method of conferencing or sharing a message base between two
- or more systems. D'Bridge features internal ECHOmail processing, eliminating
- the need for external utilities.
-
-
-
-
- EDITOR
-
- An GEDITORH is any program which allows you to read, enter, respond to EMAIL
- messages. There is an internal message editor provided with D'Bridge. It
- may be run by selecting the EDIT/READ EMAIL option from the EDITOR menu or
- by typing "DB EDIT" from the DOS prompt.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 235
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EMAIL
-
- As an abbreviation for "Electronic Mail", GEMAILH generally describes any form
- of electronic communication. This could include D'Bridge mail, FAX or TELEX
- communication.
-
-
-
-
- EPHEMERIS TIME (ET)
-
- GEPHEMERIS TIMEH was the first dynamical time scale in history; it was defined
- by the International Astronomical Union in the 1950s and was superseded by
- Barycentric Dynamical Time in 1984.
- EPHEMERIS TIME could be obtained by observing the orbital position of any
- planet or satellite and then using an ephemeris, which lists calculated
- orbital positions as a function of time. The orbital position of the Earth
- about the Sun, as developed mathematically in the American astronomer Simon
- Newcomb's tables of the Sun (1898), were selected as the standard to define
- the numerical measure of EPHEMERIS TIME. (The Earth and Sun are 180 degrees
- apart; that is, opposite each other in the plane of the ecliptic, so that an
- observation of the Sun with repects to the stars gives the orbital position
- of the Earth.) Newcomb's tables were used to form a solar ephemeris, or a
- table that gives the Sun's coordinates for successive values of EPHEMERIS
- TIME.
- Values of EPHEMERIS TIME were also obtained from observations of the Moon by
- using the lunar ephemeris for the calculated position. The lunar ephemeris,
- however, contains an empirical, nongravitational term, which was needed to
- correct for the effects of tides raised in the Earth by the Moon. The Moon
- was generally used to determine EPHEMERIS TIME because of its rapid orbital
- motion. Very accurate positions of the Moon were obtained visually by
- observations of occultations of stars by the Moon. By the time EPHEMERIS TIME
- was superseded in 1984, it had served two important purposes:
- 1. The definition of a second of EPHEMERIS TIME served as the basis for the
- redefinition in 1967 of the SI second on the ATOMIC TIME scale, and
- 2. ET was the reference scale used for comparison with rotational time to
- determine variations in the Earth's rotational speed from about 700 BC to
- AD 1955.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 236
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ERROR LEVEL
-
- An GERROR LEVELH is an "exit code" sent by D'Bridge to DOS describing an "exit
- condition". D'Bridge uses ERROR LEVELS in EXIT events so that a DOS batch file
- can detect what to do. Unless you already understand ERROR LEVELS, you most
- likely won't need to use them. For further information, consult your DOS
- manual in the section describing BATCH FILES.
-
-
-
-
- EVENT
-
- An GEVENTH is simply something which happens. In D'Bridge, EVENTS are
- scheduled by using the SCHEDULE MAINTENANCE screen. Four types of EVENTS
- are supported by D'Bridge: GMAILH, GDOSH, GEXITH and GCLOCKSYNCH.
-
-
-
-
- EXIT EVENT
-
- An GEXIT EVENTH is defined by using the SCHEDULE MAINTENANCE screen. When
- an EXIT EVENT occurs, D'Bridge will actually terminate completely providing
- DOS with a pre-specified ERROR LEVEL. This is almost always used within a
- batch file or shell program.
-
-
-
-
- EXPORT
-
- In D'Bridge, GEXPORTH means to save your current configuration in a text file
- for inspection or later use by the IMPORT command. All of the parameters in
- the setup screens may be written to a standard text file. This is handy for
- configuring a remote system and required when upgrading between revisions
- of the D'Bridge software.
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 237
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- EXTERNAL GATEWAY
-
- In D'Bridge, an GEXTERNAL GATEWAYH is a program which can be run automatically
- to receive incoming mail from other, non-compatible EMAIL systems. For
- example, there is a UUCP EMAIL receiver available for the IBM PC which will
- allow you to receive mail from UNIX and XENIX systems. A unique feature of
- D'Bridge allows it to recognize when non-compatible EMAIL systems are calling
- and transfer control to an external EMAIL receiver.
-
-
-
-
- FIDONET
-
- GFIDONETH means two things really: First, it defines the protocol D'Bridge
- uses when communicating with other Fidonet-based systems. This protocol is
- described in detail in certain documents written and maintained by the FTSC
- (Fidonet Technical Standards Committee). Second, it is the name of the largest
- Fidonet-based EMAIL network. Both the network and the protocol were created
- by Tom Jennings of Fido Software. His initiative and early efforts are what
- made the Fidonet network possible.
-
-
-
-
- FILE
-
- A GFILEH is an organized collection of information, usually similar in nature.
- When you type "DIR" in DOS, you receive a listing of all the files in the
- current directory. (Almost) any of these FILES may be transmitted via EMAIL
- to another D'Bridge or Fidonet system.
-
-
-
-
- FILE-ATTACH
-
- GFILE-ATTACHH means to send a file or list of files with an EMAIL message.
- This is normally done with the internal message editor. FILE-ATTACH is an
- "attribute" associated with a given message. If a message has the FILE-ATTACH
- attribute, all files listed in the SUBJECT line will be transmitted with the
- message.
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 238
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FILE-REQUEST
-
- GFILE-REQUESTH is similar to FILE-ATTACH, except it works in reverse. Files
- are "requested" from the specified system; when the call is placed, if those
- files exist and you have specified the right password, if any, they will be
- sent to you immediately. FILE-REQUEST is both a message "attribute" and a
- menu option in D'Bridge.
-
-
-
-
- FLAGS
-
- The GFLAGSH are the last part of a nodelist line - free-form text which may
- contain additional information about the system. Include the characters "CM"
- if you wish to designate a system as CONTINUOUS MAIL (being able to receive
- EMAIL 24 hours/day).
-
- ie.
-
- GCM,XX,HST,V32H
-
- GCMH Continuous mail
- GXXH WaZOO-style file and update requests
- GHSTH US Robotics Courier HST modem
- GV32H V.32 compatible
-
-
-
-
- FORWARD
-
- GFORWARDINGH means to send an EMAIL message which neither originated from nor is
- destined for your system. FORWARDING is used in conjunction with ROUTING to
- send mail through HOST systems, usually to save phone calls and costs. For
- example, if you wish to send a message to a system outside your NET, the
- message is normally routed to that city's HOST and will then be FORWARDED
- automatically to the destination. This way, if you have several messages to
- go to different destinations in one city, only a single phone call needs to
- be made.
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 239
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- FOSSIL
-
- An acronym for "GFHido/GOHpus/GSHEAdog GSHtandard GIHnterface GLHayer," GFOSSILH
- refers to a communications interface common to many BBS systems.
- D'Bridge does not require a FOSSIL driver, nor will it use one if installed.
-
-
-
-
- FRONT-END
-
- GFRONT-ENDH is a generic term for programs like D'Bridge, FrontDoor and Binkley-
- Term when they are used to run a combination BBS/EMAIL system. This simply
- means D'Bridge acts as a FRONT-END, answering the phone and transferring con-
- trol to a BBS or external EMAIL receiver.
-
-
-
-
- FUNCTION-REQUEST
-
- ZMODEM-based EMAIL systems like D'Bridge, FrontDoor and BinkleyTerm have the
- ability to process GFUNCTION-REQUESTSH, allowing the calling system to have
- access to predefined DOS functions or programs. This is a rather advanced
- feature and can only be used in conjunction with external programs not inclu-
- ded with D'Bridge.
-
-
-
-
- GREENWICH MEAN TIME (GMT)
-
- GGREENWICH MEAN TIME (GMT)H is the former name for mean SOLAR TIME of the
- longitude (0 degrees) of the former Royal Observatory at Greenwich, Eng.
- This longitude is called the GREENWICH MERIDIAN. GREENWICH MEAN TIME was
- used for clearly designating epoch by avoiding confusing references to local
- time systems (zones). In accord with tradition, the epoch 0000 GMT (denoting
- the start of a solar day) occured at noon. In 1925 the numbering system for
- GMT was changed so that the day began at midnight, as did the civil day.
- Some confusion in terminology resulted, though, and in 1928 the Interna-
- tional Astronomical Union changed the designation of the standard time of
- the zero meridian to UNIVERSAL TIME, which remains in general use. The term
- GMT is still used for some purpose, e.g. navigation, in English-speaking
- countries.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 240
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- GREENWICH MERIDIAN
-
- The GGREENWICH MERIDIANH is an imaginary line used to indicate 0 degrees
- longitude that passes through Greenwich, an outer borough of Greater London,
- on the south bank of the River Thames, and terminates at the North and South
- poles. An international conference held in Washington, D.C., in 1884 desig-
- nated 'the meridian passing through the centre of the transit instrument at
- the Observatory of Greenwich as the initial meridian for longitude'. The
- observatory (renamed the Royal Greenwich Observatory) was moved to Hailsham,
- East Sussex, during the 1950s, but the original site continues to serve as
- the location for 0 degrees longitude.
- As the prime meridian, the north-south line at Greenwich is used as the
- reference for all other meridians of longitude, which are numbered east or
- west of it. The Greenwich meridian also serves as the basis for the world's
- standard time zone system. The mean SOLAR TIME at Greenwich is now called
- UNIVERSAL TIME and was formerly called GREENWICH MEAN TIME. Theoretically,
- standard time becomes succesively one hour earlier at each 15 degrees
- longitude west of the GREENWICH MERIDIAN and one hour later at each 15
- degrees longitude east.
-
-
-
-
- HOLD
-
- HOLD means NOT to send mail, but rather to wait until the destination system
- calls and picks it up. Normally, D'Bridge will put all mail without CRASH
- priority on HOLD 24 hours a day. This way, a system calling to send you mail
- can always get any mail waiting for it, saving you a phone call.
-
-
-
-
- HOST
-
- Every NET has a GHOSTH; a HOST acts as a consolidation point for inbound mail
- coming from outside your NET. A host is designated by having a NODE and POINT
- number of zero. By default, all mail sent to systems outside your NET will be
- routed to a HOST or a HUB. The exception to this is if you have specified
- CRASH priority or have attached or requested a file. Usually, the NET host
- acts as the administrator for his NET, maintaining the nodelist and distribu-
- ting updates to all his NODES.
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 241
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- HUB
-
- A GHUBH is functionally identical to a HOST; it is usually only used when a NET
- is very large or spans more than one local calling area. In D'Bridge, HUB and
- HOST ROUTING are treated the same. Messages addressed to a NODE outside your
- network are ROUTED through the HUB if one exists.
-
-
-
-
- IMMEDIATE
-
- In D'Bridge (and most other Fidonet-based systems), GIMMEDIATEH refers to a
- high-priority message. It is an "attribute" which may be associated with a
- message to tell D'Bridge to send the mail immediately, to override any
- routing and call the destination system directly. Using the internal message
- editor, you can specify any message to have IMMEDIATE priority.
-
- The difference between CRASH and IMMEDIATE is that D'Bridge will process all
- of the IMMEDIATE calls before attempting to dial a CRASH or NORMAL priority
- call.
-
-
-
-
- IMPORT
-
- In D'Bridge, the term GIMPORTH is used when upgrading between releases of the
- software or anytime you wish to transfer or restore an EXPORTED configuration.
-
-
-
-
- INBOUND
-
- GINBOUNDH simply means mail arriving at your system from a remote site;
- opposite of OUTBOUND.
-
-
-
-
- INITIALIZE
-
- In D'Bridge, GINITIALIZEH is used to describe sending commands to your modem
- that INITIALIZE it, setting the correct parameters for operation. Normally,
- your MODEM INITIALIZATION STRING tells your modem to answer the phone and
- report the connection back to D'Bridge. For specific information on this,
- read the section on COMM/MODEM SETUP.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 242
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- INTERNATIONAL
-
- GINTERNATIONALH refers to any communications to systems outside your country.
- In D'Bridge, this is determined by the first part of a phone number as it
- appears in the nodelist. For the U.S., Canada, the Bahamas and several other
- neighboring countries sharing a country code of "1", communications is not
- considered INTERNATIONAL unless calling Europe or Australia; anytime the
- COUNTRY CODE in the nodelist differs from your own, that is an INTERNATIONAL
- call and the predefined INTERNATIONAL DIALING PREFIX will be used.
-
-
-
-
- LOCAL
-
- GLOCALH refers to any call where D'Bridge simply strips off the COUNTRY CODE
- and AREA CODE. It is still possible there is a charge for the call, but in
- most cases there isn't (at least not in the U.S.).
-
-
-
-
- LOG
-
- D'Bridge keeps a detailed GLOGH file of everything happening on the system.
- It contains chronological information about system activity, errors, etc.
-
-
-
-
- MACRO
-
- In the internal message editor, KEYBOARD GMACROSH are supported. What this
- means is that you can program function keys (ALT F1-F10 and CTL F1-F10) to
- substitute preprogrammed text of any length while editing messages. This is
- handy for signatures and any other text you find yourself constantly typing.
- Words, sentences or even paragraphs can be programmed into the MACRO keys.
-
-
-
-
- MAIL
-
- GMAILH simply refers to messages or files sent or received.
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 243
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- MAIL EVENT
-
- A GMAIL EVENTH is a predefined period of time during which D'Bridge is
- allowed to send mail. During this time, all messages will be sent unless
- otherwise specified in the ADVANCED ROUTING screen. It is important that
- all systems in the network use the same time for MAIL EVENTS. Remember
- that if a west-coast system starts a mail event at 1:00, systems on the
- east-coast must start the same event at 4:00: the same physical time.
-
-
-
-
- MESSAGE
-
- In D'Bridge, a GMESSAGEH is prepared using the internal editor and contains
- text to be sent to another location conveying a thought or idea. Messages are
- the basis for more EMAIL systems.
-
-
-
-
- MODEM
-
- An acronym for "GMOHdulator/GDEMHodulator". A modem is the device which allows
- computers to communicate by converting electrical impulses to audio tones and
- back. Obviously, you have a modem or you would not have purchased D'Bridge,
- so we'll assume this will suffice.
-
-
-
-
- NET
-
- Defines the second number in a Fidonet address. GNETH typically defines a
- geographical region or local calling area. In the case of a private network
- with few systems, all systems (regardless of location) could use the same
- NET number.
-
-
-
-
- NETWORK
-
- The term "GNETWORKH" refers collectively to all the systems listed in your
- nodelist. You should be able to send an EMAIL message to anyone in your
- network. Sometimes, NETWORK is used in the same way as NET, the second number
- in a Fidonet address, but they really mean two different things.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 244
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NETWORK ADMINISTRATOR
-
- Every GNETWORKH has an GADMINISTRATORH; without one, anarchy would prevail.
- There is a section devoted entirely to the duties and responsibilities resting
- with a GNETWORK ADMINISTRATORH. If you are such a person, I would strongly
- suggest you to read it. Basically, the network administrator responsible for
- the overall operation of the network and for keeping the nodelist up-to-date
- and accurate.
-
-
-
-
- NODE
-
- A GNODEH is the third number in a Fidonet address; NODE specifies an individual
- system. Much like in a telephone book, each NODE has an entry in the NODELIST
- listing information such as name, phone number and baud rate.
-
-
-
-
- NODELIST
-
- Every network has a GNODELISTH; maintained by the administrator, the NODELIST
- is a text file listing all the systems, their phone numbers, baud rates,
- cities and operator names. This list is identical on each system in the
- network and is updated whenever a new system is added or an existing one
- leaves or has information to change. In the case of the amateur networks,
- the NODELIST is updated and distributed weekly, usually every Friday.
-
-
-
-
- NORMAL
-
- In D'Bridge (and most other Fidonet-based systems), GNORMALH refers to a
- low-priority message. It is an "attribute" which may be associated with a
- message to tell D'Bridge to send the mail at the lowest possible cost,
- usually at 11:00 at night. NORMAL is actually the lack of a HOLD, CRASH or
- IMMEDIATE flag on the message(s).
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 245
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- NULL MESSAGE
-
- A GNULL MESSAGEH is a message which contains no text. Often, these messages are
- used to send or request a file and are meaningless otherwise. D'Bridge gives
- you the option to automatically erase these NULL MESSAGES after they arrive.
-
-
-
-
- OFFLINE
-
- In D'Bridge, GOFFLINEH has two meanings: First, it means the phone is not
- being answered, most-likely because you are using your computer for something
- else. Second, it means what commands you want to give to the modem when the
- system is "down" because you are using the editor or exit the program. Some
- systems are configured so that the phone is off-hook when D'Bridge is OFFLINE.
-
-
-
-
- ONLINE
-
- The opposite of OFFLINE. ONLINE means D'Bridge is up and ready to accept
- commands and/or incoming EMAIL.
-
-
-
-
- OUTBOUND
-
- The term "GOUTBOUNDH" refers to EMAIL or files ready to be sent to a remote
- system. Mail that is on "HOLD" is also called OUTBOUND. In fact, everything
- in the QUEUE window is OUTBOUND mail.
-
-
-
-
- OUTBOUND GATE
-
- Some NETs have an GOUTBOUND GATEH or GGATEWAYH - A system which sends all mail
- destined for systems outside your NET. This is often done to save money by
- consolidating all the OUTBOUND traffic into one outgoing system (perhaps the
- OGATE (OUTBOUND GATEWAY) has a WATS line and is able to make long-distance
- calls much cheaper). In any case, OUTBOUND GATEWAYS forward mail for anyone
- within their NET.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 246
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PACKET
-
- When D'Bridge sends EMAIL, it is put into GPACKETSH consolidating all messages
- into one file or PACKET. When D'Bridge connects with a system, it sends one
- packet instead of one file for each message. A packet could contain one or
- thousands of EMAIL messages.
-
-
-
-
- PARITY
-
- GPARITYH is a term only used in the D'Bridge "terminal mode". It is either
- GNONEH, GEVENH or GODDH and refers to a bit following the DATA BITS and
- coming before the STOP BIT. D'Bridge allows you to configure the PARITY any
- of these three ways to facilitate communication with different systems.
- Most BULLETIN BOARD SYSTEMS use PARITY "NONE", but you might need to change
- it.
-
-
-
-
- PASSTHRU
-
- A GPASSTHRUH ECHOmail area means that the mail is received and forwarded,
- but not stored in a Fido or QuickBBS message base. PASSTHRU areas are most
- often used by ECHO hubs who don't care to read an ECHO personally.
-
-
-
-
- PASSWORD
-
- A GPASSWORDH is the basis for the D'Bridge security system. If you wish to have
- a secure link between two systems, you choose an 8-letter PASSWORD that is
- mutually agreeable to both operators. Once these PASSWORDS are in place, it is
- impossible to communicate with the other system (using your address) unless
- that PASSWORD is specified. This is primarily designed to discourage "hackers"
- from infiltrating your network and stealing EMAIL you may have on hold.
-
-
-
-
- PATH
-
- GPATHH normally refers to the name of a DOS directory in which you wish to store
- files. A path consists of the drive name (C:) plus the name of a specific
- subdirectory. See your DOS manual for further information on directory PATHS.
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 247
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- PICKUP
-
- GPICKUPH means to call another system and receive EMAIL it has on HOLD for you.
- Every time D'Bridge connects with another system, it asks it if there is any
- mail waiting. If so and you have the proper PASSWORD, if required, you will
- receive all your mail immediately after D'Bridge sends the outbound mail.
- By default, PICKUP is not a secure way to handle mail; make sure you use a
- SESSION PASSWORD if you require security in your network.
-
-
-
-
- POINT
-
- A GPOINTH is the fourth part of a Fidonet address. A POINT system is not
- listed in the NODELIST. Normally, POINTS are not public access systems, but
- personal EMAIL systems used to communicate with the network through their
- BOSS NODE. For complete information on POINTS, see the section about
- setting-up a point system.
-
-
-
-
- POINT LIST
-
- The GPOINT LISTH is just like the nodelist but it specifies a list of POINTS
- associated with a given BOSS NODE. Again, this is only applicable for a POINT
- system and complete information is available in the section on setting-up a
- point system.
-
-
-
-
- POLL
-
- GPOLLINGH means to call a system to see if there is mail waiting even though
- you have nothing to send. For example, if you don't have a permanent phone
- number for your system or run a private node or point, you will need to poll
- your HOST or BOSS on a periodic basis in order to receive your mail. The
- perfect example of someone who needs to poll is a salesman who uses a portable
- PC to communicate with the main office.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 248
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- QUEUE
-
- D'Bridge has a GQUEUEH window which lists all of the outbound packets at any
- given time. A QUEUE is simply a list of things to do, or in this case packets
- to send.
-
-
-
-
- RAW NODELIST
-
- The GRAW NODELISTH simply refers to the nodelist when it is in the form of a
- text file, before it is compiled. D'Bridge only processes RAW NODELISTS and
- requires no external pre-processor like many other Fidonet EMAIL systems do.
-
-
-
-
- ROUTING
-
- D'Bridge has a great deal of flexibility in the way that it can GROUTEH
- messages. In simple networks, messages can simply be sent directly from the
- sender to the receiver. Actually, this can be done in any network, but in
- many cases it is more desirable to use ROUTING because it can save money and
- cut the number of phone calls. Used in conjunction with FORWARDING, ROUTING
- simply means to send a message somewhere other than the final destination.
-
- For example, if I wish to send a message to someone in Miami, it will be
- sent during my nightly mail event to the HOST or HUB in Miami. The message
- is then automatically FORWARDED to the final destination. Obviously, with
- just one message there is no savings and actually the message will take
- longer to get there because it has to be FORWARDED to its destination. But
- let's say I want to send messages to three different systems in Miami; this
- time, there is a savings because D'Bridge only makes one call instead of
- three.
-
-
-
-
- RTS
-
- An abbreviation for Request To Send. GRTSH is the companion signal to Clear
- To Send, CTS. This is sometimes referred to as "flow control" and allows the
- computer to communicate with the modem at a higher baud rate than the modem
- can actually send at.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 249
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SCAN
-
- When D'Bridge says it is GSCANNINGH for outbound mail, it actually looks at
- each message to see if it needs to be sent. As it SCANS, it creates packets
- that are added the outbound queue.
-
-
-
-
- SCHEDULE
-
- In D'Bridge, the GSCHEDULEH is a list of pre-programmed events that should be
- executed at the specified times. It uses a weekly schedule to determine when
- to send mail, execute DOS commands, terminate with an errorlevel and when to
- perform an atomic "ClockSync". The SCHEDULE MAINTENANCE screen is used to add,
- change and remove events from the schedule. The lower-right window of D'Bridge
- always displays the schedule for the current day; this is advanced each night
- at midnight.
-
-
-
-
- SCRIPT
-
- D'Bridge normally uses your telephone to connect with other EMAIL systems to
- transfer EMAIL. Sometimes it is desirable to use other carriers such as
- packet-switched networks to communicate. The D'Bridge scripting language
- allows you to communicate using other systems such as TELENET'S PC-PURSUIT.
- Many system operators in the U.S. subscribe to this low-cost data transmis-
- sion service and D'Bridge is able to take full advantage of it by using its
- SCRIPTING language.
- This is a rather advanced feature, so please read the section about script
- files for more information.
-
-
-
-
- SEALINK
-
- GSEAlinkH is one of the four file-transfer protocols D'Bridge uses to commu-
- nicate with other Fidonet-based EMAIL systems. SEAlink was developed by Thom
- Henderson of System Enhancements Associates. It was derived from the XMODEM
- protocol but has the clear advantage of eliminating propagation delays (from
- satellites) so common in long-distance communications. D'Bridge will use this
- protocol when communicating with some EMAIL systems.
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 250
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SECURITY
-
- D'Bridge has a password-based security system to protect EMAIL sessions. By
- default, no security is used and anyone with a compatible EMAIL system could
- send you mail and request files. The D'Bridge security system allows you many
- different options to improve security. See the section called SECURITY/
- MISCELLANEOUS SETUP for more information.
-
-
-
-
- SESSION
-
- A GSESSIONH or MAIL SESSION simply refers to the period of time when two EMAIL
- systems are communicating with each other.
-
-
-
-
- SOLAR TIME
-
- GSOLAR TIMEH is the time measured by the Earth's rotation relative to the
- Sun. Apparent SOLAR TIME is that measured by direct observation of the Sun
- or by a sundial. Mean SOLAR TIME, kept by most clocks and watches, is the
- SOLAR TIME that would be measured by observation if the Sun traveled at a
- uniform apparent speed throughout the year, rather than as it actually does,
- at a slightly varying apparent speed that depends on the seasons. The diffe-
- rence between mean and apparent SOLAR TIME is called the equation of time.
- This is usually expressed as a correction, never exceeding about 16 minutes,
- which is added to or subtracted from one kind of SOLAR TIME to determine the
- other. The real Sun and the imaginary 'mean Sun', from which mean SOLAR TIME
- is measured, may be as much as 16 minutes apart because during the course of
- the year the apparent motion of the real Sun against the background of the
- stars alternately slows down and speeds up. There are two reasons for this.
- First, the Earth's orbit is not exactly circular, and the Earth moves in it
- at slightly different speeds at different seasons. Second, because the plane
- of the Earth's orbit is tilted relative to the plane of the Earth's Equator,
- the apparent daily course of the Sun is shifted by varying amounts during
- the year from a straight east-west direction; and the rate of change of the
- Sun's celestial longitude, from which SOLAR TIME is derived, varies accord-
- ingly.
-
- Since 1972 the time in common use has been based on a combination of SOLAR
- and ATOMIC TIMES; it is called COORDINATED UNIVERSAL TIME (UTC). Its second
- is the second of ATOMIC TIME, while its epoch is kept by periodic adjustment
- within 0.9 second of mean SOLAR TIME.
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 251
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- SPAWN
-
- GSPAWNH refers to the method of executing another program while keeping the
- calling program in memory. An example of this is DOS EVENTS. All commands
- issued in DOS EVENTS are SPAWNED; this means D'Bridge is still in memory and
- resumes operation as soon as the SPAWNED task is complete. This method can
- only be used if there is enough free memory to load the SPAWNED program after
- D'Bridge.
-
-
-
-
- STOP BITS
-
- GSTOP BITSH is a parameter only found in the D'Bridge "terminal mode". On an
- IBM computer, it may have a value of either 1 or 2. Most systems use 1 stop
- bit without exception, but it is left to your control for maximum flexibility.
-
-
-
-
- TELINK
-
- GTELINKH is one of the four file-transfer protocols used by D'Bridge. It is
- a batch protocol consisting of XMODEM file-transfers preceded by MODEM7
- filename headers. This is the standard protocol defined by the Fidonet
- Technical Standards Committee as a "fallback" protocol for Fidonet. D'Bridge
- will use this protocol when communicating with some EMAIL systems.
-
-
-
-
- TERMINAL
-
- D'Bridge has a "GTERMINAL MODEH" which turns D'Bridge into a teletype or video
- display terminal (VDT). When using TERMINAL MODE, you can connect with other
- online services such as bulletin board systems and commercial systems like
- CompuServe<TM>.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 252
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- TIMEOUT
-
- A GTIMEOUTH ERROR is a condition when the remote system fails to respond
- within an allotted period of time. The cause of such an error can be hardware
- trouble, poor line conditions or a software error. If a TIMEOUT ERROR happens
- consistently when calling a certain system, you might want to follow up with
- a voice call to the system operator.
-
-
-
-
- TRIES
-
- The number of GTRIESH refers to the number of times D'Bridge dials another
- system without getting a connection. During mail events, D'Bridge defaults to
- a maximum of 30 TRIES, but you may change this to any number you wish by using
- the SCHEDULE MAINTENANCE screen.
-
-
-
-
- UN-EVENT
-
- The GUN-EVENTH refers to the "event" that is running when there is no scheduled
- event active. The UN-EVENT configuration (found in SCHEDULE MAINTENANCE)
- controls how crashmail is handled and how mail is routed outside other events.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 253
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- UNITED STATES NAVAL OBSERVATORY (USNO)
-
- GUSNOH in Washington, D.C., is an official source, with the U.S. National
- Institute of Standards and Technology (NIST), for standard time in the
- United States. The positional measurement of celestial objects for purpose
- of timekeeping and navigation has been the main work of the observatory
- since its beginning. In 1833 the first small observatory building was
- constructed near the Capitol. Time signals for the public were first given
- (1844) by the dropping of a ball from a staff on an observatory building.
- In 1904 the observatory broadcast the world's first radio time signals.
- The observatory has been enlarged and moved several times. A 40-inch (102-
- centimetre) reflecting telescope acquired in 1934 was moved in 1955 to
- Flagstaff, Ariz., to obtain better atmospheric conditions, and a 61-inch
- (155-centimetre) reflector has been in use at Flagstaff since 1964. Other
- stations are maintained in Florida and in Argentina.
- Statutory responsibility for 'standard time' (i.e., establishment of time
- zones in the United States) is currently lodged with the Department of
- Transportation. The NAVAL OBSERVATORY is specifically responsible for
- standard time, time interval, and radio-frequency standards for use by the
- U.S. Department of Defense and its contractors. Both the USNO and the NIST
- maintain independent time standards, but since October 1968 they have been
- coordinated to maintain synchronization to approximately one microsecond.
- USNO broadcasts time and frequency information at intervals (as the NIST
- does on a 24-hour basis). Both agencies cooperate with the Bureau
- International de l'Heure in Paris.
- D'Bridge will set your system's clock to USNO's computer based time signal,
- when you instruct it to make time adjustments based on the 'ATOMIC CLOCK'.
- USNO is modulating time signals on a 1200 bps carrier wave through normal
- voice-grade dial-up telephone lines.
- The telephone number to call for this service is +1-202-653-0351.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 254
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- UNIVERSAL TIME (UT)
-
- GUNIVERSAL TIMEH is the mean SOLAR TIME of the GREENWICH MERIDIAN (0 degrees
- longitude). UNIVERSAL TIME replaced the designation GREENWICH MEAN TIME in
- 1928; it is now used to denote the SOLAR TIME when an accuracy of about one
- second suffices. In 1955 the International Astronomical Union defined several
- categories of UNIVERSAL TIME of successively increasing accuracy. UT0 repre-
- sents the initial values of UNIVERSAL TIME obtained by optical observations
- of star transits at various astronomical observatories. These values differ
- slightly from each other because of the effects of polar motion. UT1, which
- gives the precise angular coordinate of the Earth about its spin axis, is
- obtained by correcting UT0 for the effects of polar motion.
- Finally, an empirical correction to take account of annual changes in the
- Earth's speed of rotation is added to UT1 to convert it into UT2. COORDINATED
- UNIVERSAL TIME (UTC), the international basis of civil and scientific time,
- is obtained from an ATOMIC CLOCK that is adjusted in epoch so as to remain
- close to UT1; in this way, the SOLAR TIME that is indicated by UNIVERSAL
- TIME is kept in close coordination with ATOMIC TIME.
-
-
-
-
- UNPACK
-
- When EMAIL arrives from another system, it is in the form of PACKETS. Unless
- otherwise specified, D'Bridge will GUNPACKH these packets into messages when
- they arrive.
-
-
-
-
- UPLOAD
-
- When using the D'Bridge "terminal mode", there is an GUPLOADH option enabling
- you to transmit file(s) to a remote computer. You can use the XMODEM, SEAlink
- or ZMODEM protocols for this function.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 255
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- WAZOO
-
- An acronym for "WArp Zillion Opus-to-Opus". GWaZOOH is one of the EMAIL
- protocols supported by D'Bridge. WaZOO sessions begin with a YOOHOO packet
- exchange, then usually send mail and files with either SEAlink or ZMODEM
- protocols, depending on the capabilities of the communicating systems. WaZOO
- was designed by Wynn Wagner, III and is the EMAIL protocol used by most of
- the Fidonet-compatible mailers currently available: D'Bridge, FrontDoor,
- Opus, BinkleyTerm and Intermail.
-
-
-
-
- WINDOW
-
- A GWINDOWH is simply an area on the screen D'Bridge uses to display information
- in. When I refer to a window, I simply mean a section of the screen.
-
-
-
-
- XMAIL
-
- GXMAILH is simply a term that means "compressed mail". An XMAIL packet
- contains any number of mail packets and may be created using the ARC, ZIP,
- PAK, LHA or ZOO formats.
-
-
-
-
- XMODEM
-
- GXMODEMH is one of the most universal communications protocols available.
- Most people credit Ward Christianson with coding and documenting the first
- XMODEM communications program, but I can't say for sure. XMODEM is the basis
- of Fidonet communications for sending the initial mail packet. D'Bridge will
- use this protocol when talking to some EMAIL systems.
-
-
-
-
- YOOHOO
-
- GYOOHOOH is the name of the handshaking protocol D'Bridge uses when talking
- to other WaZOO-based systems. The YOOHOO/2U2 handshake passes such information
- as your address, system and operator name as well as session passwords.
- YOOHOO and YOOHOO/2U2 were designed by Wynn Wagner, III.
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- 9.00 GLOSSARY OF TERMS
- 256
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- ZMODEM
-
- GZMODEMH is the protocol D'Bridge uses when communicating with other "HiTek"
- systems. Most WaZOO-based EMAIL systems are capable of ZMODEM file-transfers,
- but not all. D'Bridge will automatically select this protocol if the other
- system is compatible with it. The advantage ZMODEM has over the other proto-
- cols is the ability to dynamically adjust the block size for the line condi-
- tions. D'Bridge can send and accept any block size between 64 and 8192 pro-
- viding a fairly wide tolerance for poor line conditions. D'Bridge's ZMODEM
- also features 32-bit CRCs for high data integrity and the ability to continue
- an aborted transfer from the exact point where it left off. Chuck Forsberg is
- generally credited for documenting ZMODEM and promoting its popularity.
-
-
-
-
- ZONE
-
- A GZONEH is the first number in a Fidonet address and generally specifies the
- continent where the system is located. Some other networks have started using
- a different ZONE to separate them from the Fidonet amateur network.
-
-
-
-
- ZONEGATE
-
- When communicating with other ZONES, it is possible to cut your communication
- costs by sending your EMAIL through the GZONEGATEH. For example, if I wish to
- send a message to my friend in Europe, I can tell D'Bridge to route the
- message through the ZONEGATE and I can send the message with just an in-
- expensive domestic call to the European ZONEGATE. From there, he pays the
- bill to forward the message to the American ZONEGATE in Europe who in turn
- forwards it on to its destination. The only drawback to this approach is
- that it is fairly slow getting to its final destination and your message
- can be read by every system operator along the way. Personally, I am willing
- to pay the direct connection charges to ensure that the message arrives
- quickly and privately.
-
-
-
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- A.00 ACKNOWLEDGEMENTS
- 257
- --------------------------------------------------------------------------------G
-
-
-
-
-
-
- A.00 ACKNOWLEDGEMENTS
-
- D'Bridge would not be what it is today without the ideas and inventions
- of others. I feel they all deserve credit for their work, so I am inclu-
- ding this section. I have built on the ideas of many other software de-
- velopers and I want to thank them all for their efforts.
-
-
- GTOM JENNINGSH
-
- Tom is the creator and "mastermind" of the entire Fidonet concept. In
- 1984, he created a bulletin board system called Fido which had the unique
- ability to communicate with other Fidos overnight, sending electronic
- mail and files. Starting very simple, Fido grew and the software became
- more advanced, adding features such as forwarding and routing. Fido is
- still widely used today by many individuals and corporations that have
- a need to communicate via EMAIL. Thank you, Tom, for creating a system
- and a standard that have spawned the largest public amateur EMAIL network
- in the world today. Where would we be without you?
-
-
- GJOAQUIM HOMRIGHAUSENH
-
- JoHo and I always traded ideas around and quickly they became a standard
- part of both D'Bridge and FrontDoor. EMSI was the greatest example. We
- worked together and co-designed the GElectronic Mail Standard IdentificationH
- protocol for WaZoo-based sessions. Thanks, Joaquim.
-
-
- GTHOM HENDERSONH
-
- Thom has been a major factor in the advancement of the Fidonet standard.
- His company, System Enhancements Associates is responsible for developing
- the ARC standard, the SEAlink file-transfer protocol and SEAdog, another
- commercial EMAIL package. About 5 years ago, I purchased a copy of SEA-
- dog 4.0 and used it until I wrote D'Bridge. SEAdog took the Fidonet
- standards and extended them, supporting such features as file-request
- and crashmail. I wish to thank Thom for all the things he has done to
- help Fidonet and the EMAIL community. His SEAlink protocol has saved
- many people a LOT of money on their phone bill.
-
-
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- A.00 ACKNOWLEDGEMENTS
- 258
- --------------------------------------------------------------------------------G
-
-
-
-
- GRAY GWINNH
-
- We wish to greatly thank Ray Gwinn for allowing us to include his
- serial I/O library as a part of D'Bridge. Building the SIO library,
- Ray worked many years to bring the X00 driver through many hardware
- and specification changes.
-
-
- GWYNN WAGNER IIIH
-
- Wynn is the creator of Opus, "a computer-based conversation system".
- He took all the good ideas in Fidonet and created another EMAIL standard
- called WaZOO. D'Bridge uses the WaZOO standard when communicating with
- other "HiTek", but non-EMSI systems. I wish to thank Wynn for making
- these standards available for all to use and creating documentation clear
- enough to make implementation easy.
-
-
- GCHUCK FORSBERGH
-
- Chuck, with his company, Omen Technology is credited with the develop-
- ment of the ZMODEM protocol and making it as popular as it is today.
- I used a document he wrote in August, 1986 describing very clearly how
- to implement the ZMODEM protocol. Without testing with his program, DSZ,
- it would have been very hard (if not impossible) to ensure that our
- 32-bit CRC logic was working correctly.
-
-
- GJEFF RUSHH
-
- Jeff was responsible for bringing ECHOmail to the Fidonet community. He
- didn't really invent ECHOmail, but set a clear definition in his original
- ECHOmail program (designed for use with Fido and SEAdog) which has re-
- mained virtually unchanged to date. I think we should all appreciate the
- initiative he took in the early days of Fidonet to bring conferencing
- ability to our network.
-
-
- GGREG DAWSONH
-
- Greg designed and wrote a system called AREAFIX which he graciously
- allowed us to incorporate into D'Bridge. His AREAFIX system allows
- ECHOmail distributors to automate the routine maintenance that was
- required when conferences were added and deleted.
-
-
-
-
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin
- A.00 ACKNOWLEDGEMENTS
- 259
- --------------------------------------------------------------------------------G
-
-
-
-
-
- GADAM HUDSONH and GSTEVE GABRILOWITZH
-
- Adam originally wrote the QuickBBS software which is in widespread use
- today. He has been cooperative in helping D'Bridge be compatible with
- his fine BBS program. We thank him for allowing us to use his message
- base format within D'Bridge. Steve took over the project a few years
- back and has been most helpful in getting the QuickBBS message-base
- locking code in place.
-
-
- GARTHUR GREENBERGH
-
- Arthur has been a constant source of ideas and inspiration. I wish to thank
- him for all his testing and coordination effort. He is listed in both the
- Fidonet and DBNET nodelists as D'Bridge HELP/USA. Thanks again, Arthur!
-
-
- GBETA-TEST GROUPH
-
- D'Bridge just wouldn't be possible without our Beta-test group which
- put the software "through a ringer" before you ever saw it. I wish to
- thank them all for their effort and dedication during the development
- process...
-
-
- GCOPYRIGHT / TRADEMARK ACKNOWLEDGMENTSH
-
-
- - GAirMailH is a trademark of Joaquim Homrighausen
- - GARCH is a trademark of System Enhancement Associates
- - GAREAFIXH is a trademark of Greg Dawson
- - GBinkleyTermH was written by Bob Hartman and Vince Perriello
- - GDutchieH was written by Henk Wevers
- - GECHOmailH was originally designed by Jeff Rush
- - GFidoH and GFidonetH are trademarks of Tom Jennings (Fido Software)
- - GFrontDoorH is a trademark of Joaquim Homrighausen
- - GInterMailH is a trademark of InterZone Software
- - GLHAH was created by Haruyasu Yoshizaki
- - GOpusH, GWaZOOH and GYOOHOOH are trademarks of Wynn Wagner III
- - GPAKH was created by NoGate Consulting
- - GPC-PursuitH is a servicemark of Telenet
- - GQuickBBSH is a trademark of Steve Gabrilowitz (Pegasus Software)
- - GSEAdogH is a trademark of System Enhancements Associates
- - GWildcatH is a trademark of Mustang Software
- - GXMODEMH was originally made popular by Ward Christianson
- - GZIPH was created by Phil Katz of PKware
- - GZMODEMH was documented by Chuck Forsberg
- - GZOOH was developed by Rahul Dhesi
-
-
-
- -------------------------------------------------------------------------------
- D'Bridge 1.53/000001 - Copyright 1987-92, Chris Irwin