home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Tools & Utilities
/
Collection of Tools and Utilities.iso
/
bbsutil
/
2am3_1a.zip
/
2AMSYS3.DOC
next >
Wrap
Text File
|
1988-11-01
|
190KB
|
5,615 lines
2AM-BBS, Version 3.0
Sysop's Manual
(c) Copyright 1986,1987,1988 by:
Chris Gorman
Neil Clarke
Tom Vogl
2AM Associates
May 8, 1988
Table Of Contents
Chapter 1 Introduction
1.1 The 2AM-BBS Documentation Set.................................1-1
1.2 System requirements...........................................1-1
1.3 Setup.........................................................1-1
1.4 Sub-Directories...............................................1-2
1.5 Your AUTOEXEC.BAT File........................................1-3
1.6 Technical Support.............................................1-4
1.7 Networks......................................................1-5
Chapter 2 Keyboard Functions
2.1 Logging In From The Console...................................2-1
2.2 Stopping & Restarting The BBS.................................2-1
2.3 Help Key......................................................2-1
2.4 Input/Output In 2AM-BBS.......................................2-1
2.4.1 The Printer..............................................2-1
2.4.2 Output To Disk...........................................2-2
2.5 View/Edit Current User........................................2-2
2.6 Reserving The Terminal........................................2-2
2.7 Bell Toggle...................................................2-2
2.8 Jumping To DOS................................................2-2
Chapter 3 Further Setup and Customization
3.1 Menus.........................................................3-1
3.2 Text Files....................................................3-2
Chapter 4 The User Validator
4.1 Files.........................................................4-1
4.1.1 USERLOG.DAT..............................................4-1
4.1.2 User Application File....................................4-2
4.1.3 System Logs..............................................4-2
4.1.4 Lookup Files.............................................4-3
4.1.5 ACCESS.DAT...............................................4-3
4.2 Privilege Bits For New Users..................................4-3
4.3 Validator Commands............................................4-3
4.4 The Sweeper...................................................4-5
4.5 Privileges For The Validator..................................4-8
Chapter 5 User Logins
5.1 New User Logins...............................................5-1
5.2 The Standard Login ...........................................5-2
5.3 NEWUSER.DAT...................................................5-3
5.4 .DEF Files....................................................5-3
5.5 Special Login Messages........................................5-4
5.6 Rejects.Dat...................................................5-4
Chapter 6 The Editor
6.1 Privileged Options ...........................................6-1
6.2 Privilege Bits Used...........................................6-1
i
Chapter 7 Message Bases
7.1 File Formats (BASEINFO).......................................7-1
7.2 Base Maintenance .............................................7-4
7.3 Privilege Bits Used...........................................7-6
7.4 Base Cleanups ...............................................7-6
Chapter 8 Email Utility
8.1 Email Commands................................................8-1
8.2 Special Options During Read Incoming..........................8-1
8.3 Maintenance Commands..........................................8-2
8.4 Files.........................................................8-2
8.5 Privilege Bits and Mail Quotas................................8-3
Chapter 9 Files Section
9.1 File Credits and Times........................................9-1
9.2 File Formats..................................................9-1
9.2.1 Download Files ..........................................9-1
9.2.2 Upload Files.............................................9-3
9.2.3 External Protocols.......................................9-3
9.3 The Maint Utility.............................................9-4
9.3.1 From A File Library......................................9-4
9.3.2 From The Upload Library..................................9-5
9.4 Privilege Bits Used...........................................9-5
Chapter 10 BBS Lister Utility
10.1 File Formats................................................10-1
10.2 Maintenance Commands........................................10-1
10.3 Privilege Bits Used.........................................10-1
Chapter 11 JumpDoors
11.1 File Formats................................................11-1
11.1.1 PASSAGES.DAT...........................................11-1
11.1.2 JUMPER.DAT.............................................11-2
11.2 The Maint Utility...........................................11-2
11.3 Notes On Writting Jumpdoors.................................11-3
11.4 Privilege Bits Used.........................................11-3
Chapter 12 Trivia
12.1 File Formats................................................12-1
12.2 Maintenance Section.........................................12-2
12.3 Privilege Bits Used.........................................12-3
Chapter 13 Voter
13.1 File Format.................................................13-1
13.2 Maintenance Commands........................................13-1
13.3 Privilege Bits Used.........................................13-1
Chapter 14 Chat Utility
14.1 Request Chat................................................14-1
14.2 Accept/Deny Chat............................................14-1
14.3 Leaving Chat................................................14-1
14.4 Chat Files..................................................14-1
ii
Chapter 15 Other Main Menu Options...
15.1 Configure...................................................15-1
15.2 Feedback....................................................15-1
15.3 System Info.................................................15-1
15.4 Off.........................................................15-1
15.5 Daily Log...................................................15-1
15.6 Login Notes.................................................15-2
15.7 User Application............................................15-2
15.8 Error! ....................................................15-2
Chapter 16 Main Menu Maintenance
Chapter 17 Miscellaneous Options
17.1 Loggin In From The Console..................................17-1
17.2 Timeouts....................................................17-1
17.3 Carrier Drops...............................................17-1
17.4 The Scheduler...............................................17-1
17.5 A Note About Backups........................................17-2
Chapter 18 Utilities
18.1 BASEEDIT.EXE................................................18-1
18.2 BSMAINT.EXE.................................................18-3
18.3 DAYVIEW.EXE.................................................18-4
18.4 DBMAINT.EXE.................................................18-4
18.5 DIRSORT.EXE.................................................18-5
18.6 DRIVER.EXE..................................................18-6
18.7 HLPMAINT.EXE................................................18-6
18.8 LOOKER.EXE..................................................18-7
18.9 MAKEVOTE.EXE................................................18-7
Appendix 1 Privilege Bits
1.1 By Number............................................Appendix 1-1
1.2 By Use...............................................Appendix 1-2
Appendix 2 2AM File Map
Appendix 3 Multiuser Setup and Commands
Appendix 4 Bit Encoded Responses
Appendix 5 The DRIVE.DAT File
5.1 System Specifics.....................................Appendix 5-1
5.2 Drive Paths..........................................Appendix 5-1
5.3 Prompts..............................................Appendix 5-1
5.4 Headers And Messages.................................Appendix 5-2
5.5 Modem And Port Information...........................Appendix 5-2
Appendix 6 ANSI Color Commands
Appendix 7 Trouble Shooting
Index
iii
2AM BBS
Sysop's Manual Introduction
_________________________________________________________________________
Introduction
Chapter 1
1.1 THE 2AM-BBS DOCUMENT SET
The documentation for this Bulletin Board System is divided into two
manuals. Each is tailored for a certain kind of user. The first manual
is the 2AM-BBS User's Manual. It contains all the information that one
of your users needs to use every public feature of this board. In
purchasing this product, you are given full rights to copy the user's
manual, and we encourage you to do so. Also, you will find the user's
manual helpful for yourself in learning simple principles behind the
board's operation. This manual, the second manual, is the 2AM-BBS
Sysop's Manual. It is a reference manual and contains notes on sysop
sections as well as file formats for all the utilities and any other
information you might need to operate the board.
1.2 SYSTEM REQUIREMENTS
2AM-BBS will run on any IBM-PC or IBM compatible computer with at least
256K of memory running under the MS-DOS or PC-DOS operating system. You
need DOS 2.1 or higher, a hard drive and a Hayes compatible modem.
1.3 SETUP
Setup is simple. You should have 2 or more disks labeled 2AM-BBS disk
#1, 2AM-BBS disk #2, etc. Place the first disk into drive A: of your
computer and make sure you are at an "A>" prompt, and type INSTALL at the
DOS prompt. This program will copy all the files from the distribution
disks onto the drive you want to keep the BBS files on. By default, it
would like to put all files on Drive C (probably some kind of hard disk)
in a subdirectory c:\bbs. If you do not want to use this configuration,
you will have the opportunity to change all of these parameters during
installation.
After you have completed the install procedure, log onto the drive and
subdirectory where the system files are (sys_disk in the installation
procedure) using the DOS command: CD \BBS . Make sure your modem is
turned on, and type: BBS . You are now up and running. Note, if you are
planning on running a multiport system, please refer to the multiuser
section of this documentation. To log in locally (not through the
modem), hit the ESCAPE key. An account has already been setup for you.
Account number 1 is the sysop account. Its password is 2AM-BBS. We
strongly suggest that you change the password as soon as you log in since
this default account exists on all 2AM-BBS's and people know the number
and password for it.
At this point, you are running 2AM-BBS with the default files that we
gave you. Nothing is customized to your tastes and you will obviously
1-1
2AM BBS
Sysop's Manual Introduction
_________________________________________________________________________
want to make a lot of changes. In order to do so, you will need two
things: An ASCII editor and this manual.
Many of the files 2AM uses can be modified with an ASCII editor. An
ASCII editor is any editor that does NOT but special characters in the
file. DOS's EDLIN program is an ASCII editor. If you are not sure if an
editor is ASCII or not, try TYPEing a file that it wrote from DOS. If
the file lists exactly how it looked in the editor, the editor is
probably an ASCII editor. If you do not have an ASCII editor - do not
panic, you can use 2AM's editor to modify most of these files.
You will need this manual for reference purposes since many files have a
specific format that they must be in. Please keep this manual in a
convenient location since you will probably refer to it often during your
initial setup.
1.4 SUB-DIRECTORIES
2AM-BBS uses many different files to operate. These files are neatly
grouped into subdirectories. Two notes about these subdirectories:
1. There is a file in with the program files called DRIVEx.DAT. The "x"
can be a number (1, 2, 3 etc..) or it could be non-existent. If the
BBS is to be run as a single user system, DRIVE.DAT is all you will
need. If you plan to run more than one line, then please refer to the
multiuser section of this manual. For the sake of clarity, we will
refer to this file simply as DRIVE.DAT. DRIVE.DAT is a text files
and contains, among other things, a list of all the subdirectories
that have been created for the board. It must exist on the system
disk or the BBS will not be able to start. When the system runs, it
reads this file to find out where to go to get things. If you want to
move files, you can create different subdirectories and modify
DRIVE.DAT to look at these new subdirectories. For example, if you
wanted to move the help files from "c:\bbs\help\" to "b:\help\", mkdir
b:\help, copy the files to that directory, and edit DRIVE.DAT. Now
use the utility DRIVER.EXE (supplied with 2AM-BBS) to edit this file.
DRIVER can be used to edit any DRIVE.DAT file and is recommend over
the use of a standard text editor.
2. Since people are really fond of moving subdirectories around in this
manner, we can't just say things like "change directory to
c:\bbs\help". Some people might not have their help files there. As
a result, we have come up with logical name for each subdirectory.
For example, the logical name for the subdirectory with the help files
in it is help disk. You will see these names used constantly in this
manual.
Now, let us give you a listing of all the subdirectories with there
logical names and a brief statement of what sort of files are in each:
1-2
2AM BBS
Sysop's Manual Introduction
_________________________________________________________________________
Base_disk Message bases reside here.
BBS_disk Contains the database files for the BBS lister.
Chat_disk Contains all the CHAT text files.
Dload_disk Contains library files for the download section
Help_disk Contains the system HELP files.
Jump_disk Contains files for the JumpDoors Utility
Log_disk Contains all the daily logs.
Look_disk Contains user lookup tables. DO NOT ALTER THESE FILES! If
you have a problem with these files, refer to the LOOKER
utility supplied with 2AM-BBS.
Mail_disk All EMAIL will reside here.
Menu_disk Contains the system MENUS.
Sem_disk Directory for internal use by 2AM-BBS.
Sys_disk Contains 2AM-BBS itself and some key system files.
Text_disk Contains TEXT files such as login notes and bulletins.
Trivia_disk Contains all the files for trivia.
Uload_disk Contains the uploads and the files that handle them.
Vote_disk Contains files for the voting booth.
1.5 YOUR AUTOEXEC.BAT FILE
When your computer boots up, it reads the file autoexec.bat. So that the
BBS will re-boot if power goes out, put lines to change directory to
sys_disk and execute BBS in this file. For example:
C:
CD \BBS
BBS
1.6 TECHNICAL SUPPORT
The authors of this software are just as excited about seeing your board
in operation as you are. We are happy to help you out if you should get
stuck. However, we also would like you to be able to solve problems on
1-3
2AM BBS
Sysop's Manual Introduction
_________________________________________________________________________
your own (since there are many little things to keep track of). We
really do not anticipate too much worry; everything has been tested
thoroughly before it was shipped to you by our beta test sites. However,
if anything goes wrong, or you need help, here are steps you can take:
1. Check the manual first PLEASE!. Some setups are tricky, and you might
have to do a little file debugging to get everything working. Most
problems can be fixed if you are careful to compare the files you have
setup against the samples in this manual.
2. All registered owners of this program have access to special bases at
the DREW Underground, 201-377-8245, 201-377-8193, 201-377-7861, 201-
377-6810 or 201-377-4538 (yes - it is a 5 line 2AM-BBS). Any
questions left in these bases will be answered promptly. If you are
an experienced sysop, we encourage you to help out others through
these bases. Also, discussions on improvements for the board are very
much encouraged. This is your best approach to getting answers. We
would appreciate it if you would try to reach us via The Underground
before calling us voice.
3. If you have access to BITNET, you can contact us via the following
accounts:
Neil : NCLARKE@DREW
Chris : CGORMAN@CITCHEM
4. Above we mentioned that all registered users of this program have
special access at the Drew Underground. Since this is a demonstration
copy of 2AM-BBS, you do not have to register your copy with us.
If you find you have problems, you can still call the Underground
(numbers above) and leave feedback. The authors will get in touch
with you as soon as possible.
Should you decide to purchase a full copy of 2AM-BBS, you will
receive the home phone numbers of all the 2AM Associates. If you
encounter a problem or have any questions with a full 2AM-BBS
system, you can call us direct and get immediate assistance from
us.
1.7 NETWORKS
Currently, there is a version of 2AM-BBS available for the BI-TECH
network. If you are interested in obtaining a version of 2AM-BBS for any
other network system, contact 2AM Associates. We will be happy to
develop a version of 2AM-BBS for any network for which you can provide us
specifications.
1-4
2AM BBS
Sysop's Manual Keyboard Functions
_________________________________________________________________________
Keyboard Functions
Chapter 2
2.1 LOGGING IN FROM THE CONSOLE
If a user has privilege bit #72, he can access the BBS from the terminal
(local mode). This privilege bit prevents anyone from walking up to your
terminal and logging in. It is especially useful when the terminal is
easily accessed by many people that you don't want logging in locally.
To log on in local mode, hit the ESCAPE key.
2.2 STOPPING AND RE-STARTING 2AM-BBS
When running 2AM-BBS from the terminal (not via the modem), remember the
following keys:
1. Shift-F10 stops the program and returns you to DOS.
2. Shift-F9 will halt the system and re-start it. Using either of these
function keys while a user is online will drop the user from the
board.
2.3 HELP KEY
F1 is the help function key. A window appears at the top of the screen
with all of the function keys and their definitions displayed alongside.
2.4 INPUT/OUTPUT IN 2AM-BBS
2.4.1 THE PRINTER
If you have a printer and wish calls to be logged to it, create the file
sys disk:pon.cnf. 2AM-BBS just checks to see if it exists before logging
calls to the printer - the file need not contain anything.
In addition to logging calls, the printer can be used with the following
keys:
1. F3 will send everything that appears on the screen to the printer.
Hitting F3 again will turn the printer off. When this is in use, the
letter P will appear in the status line at the top of your screen.
Note that this option may not be used while file save (F5) is active.
2. F4 will dump whatever is currently on the screen to the printer.
2.4.2 OUTPUT TO DISK
F5 sends everything that appears on the screen to a disk file. The
system will pause and you will be prompted for a file name when you hit
2-1
2AM BBS
Sysop's Manual Keyboard Functions
_________________________________________________________________________
this key. Hitting F5 again will stop sending output to a file. When
this is in use, the letter F will appear in the status line at the top of
your screen. Note that this option cannot be used while output to
printer (F4) is active.
2.5 VIEW/EDIT CURRENT USER
1. F7 allows the sysop to view the user currently online. A window
appears on the top of the screen with information about the user such
as the user's name, number, time limit, time remaining, file credits,
e-mail limit, e-mail sent, etc.
2. F8 allows the sysop to edit the user online. A definition file may be
used, or the sysop may edit the user manually. Options include
adjusting the user's time remaining, adding or subtracting privilege
bits, changing the e-mail limits, file credits, etc. Note: if
security mode is ACTIVE (set in the Validator), this function is
disabled.
2.6 RESERVING THE TERMINAL
F6 reserves the next available login for the sysop. When the current
user logs out, the board takes itself offline and sounds an alarm to
notify you that the board is available. The letter R will appear in the
status line at the top of the screen when this function is in use.
2.7 BELL TOGGLE
F2 toggles the bell on and off. Default is bells on. Resetting the
board with Shift-F9 will not turn the bell toggle off, but a system
reboot will return the toggle to its default mode. The letter B will
appear in the status line at the top of the screen when the bell toggle
is on.
2.8 JUMPING TO DOS
Hitting ALT-J from almost anywhere in the system (when a user is logged
in) will take you into DOS if you are running 2AM-BBS locally (from the
terminal). Any user on-line when you jump to DOS will have his/her
screen "freeze". They will not see what you are doing in DOS. Type EXIT
at a DOS prompt to return to 2AM-BBS. NOTE: You cannot jump to DOS when
a user is in the editor.
2-2
2AM BBS
Sysop's Manual Further Setup and Customization
_________________________________________________________________________
Further Setup and Customization
Chapter 3
2AM-BBS uses many text files that the sysop can configure to his or her
tastes, and this chapter covers some general principles for modifying
these files.
3.1 MENUS
Menus are pre-created but can be changed to suit your tastes. If you
intend to customize your system, this is a good place to start. As they
stand now, menus display all options open to a new user. Privileged
options are not displayed. As a rule of thumb, we do not generally show
a user anything that he does not have access to.
2AM-BBS supports 40 and 80 columns as well as standard ANSI color
commands. If the menu contains IBM extended graphics characters and the
user cannot display them, then these characters are displayed as periods.
Menu names have three different formats. Below are examples for 2AM's
Main menu:
1. If the file main80x.mnu exists and the user has responded that he or
she can display ANSI graphics, this file will be output. If you have
an ANSI editor and want to make ANSI menus, put the addition "80x" on
the menu name to create files of the form "abcd80x.mnu" where "abcd"
is the menu name shown below.
2. If the ANSI menu does not exist OR if the user cannot display ANSI,
but has an 80 column screen, the file main80.mnu will be output if it
exists. When writing 80 column menus, create files of the form
"abcd80.mnu" where "abcd" is the menu name shown below.
3. If both cases 1 and 2 fail (either only one menu is set up OR the user
cannot display ANSI or 80 columns) then the file main.mnu will be
output. If you do not wish to have more than one menu for a section,
use menus without the "80" or "80x" additions to the name.
The menus are as follows (just the "abcd" part here, you add the "80" or
"80x" additions as appropriate:
1. base : Menu for the message bases
2. bbsls: Menu for the BBS Lister
3. bmain: Menu for base maintenance
4. conf : Menu for the configure section
5. door : Menu for the jumpdoors section
6. edcom: Menu for the editor
7. email: Menu for Email
8. files: Menu for the FILES section
3-1
2AM BBS
Sysop's Manual Further Setup and Customization
_________________________________________________________________________
9. main : Main menu
10. maint: Menu for the main maintenance section
11. triv : Menu for the trivia section
12. valid: Menu for the user validator
13. voter: Menu for the voter section
NOTE: All of these files are straight ASCII with one exception. If the
character ASCII 250 is embedded in the file as the first character on a
line, it will be intercepted and the message:
Hit RETURN to continue
will be output. Different editors will allow you to put ASCII 250's in
files in different ways, but the most standard way is to hold down the
ALT key, and, holding it down, type "250" on the numeric keypad on the
right of the keyboard. This feature allows both you and us to paginate
various text files. You can make use of this special ASCII character in
any text file that the BBS outputs.
3.2 TEXT FILES
These files are in text_disk and also may be customized. Specifics for
introduction and information files in text_disk will have to be filled
in. All of the features (the "80" and "80x" additions, the Ascii 250,
etc.) that existed for the menus exist for text and information files as
well. If the first character in a text file is a "w", (note: lower case)
the text file will be displayed in either 40 or 80 columns depending on
the user's configuration.
Please examine the help files supplied with 2AM-BBS for examples of files
using the "w" format. For best effect, "w" format files should be
created with a word processor that supports hard and soft carriage
returns.
3-2
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
The User Validator
Chapter 4
The validator is the section of the BBS that allows the sysop to edit,
view, and maintain all user accounts. You enter the validator by typing
"@" at the main menu. Please note: if you do not have the privlege bit
required for the validator, you will receive an "Invalid Command" message
when typing "@" here.
4.1 FILES
This section describes all the files used by the validator section of
2AM-BBS.
4.1.1 USERLOG.DAT
The userlog file is sys disk:userlog.dat. It contains all nonpersonal
data about the users. The following information is stored:
1. Username. The name the person uses on the board, not necessarily a
real name.
2. Password.
3. Date of first login.
4. Date of most recent login.
5. Total time on system (hours : minutes).
6. Total number of calls ever made by the person.
7. Time limit on system. The maximum time allowed is 1439 minutes per
day (23 hours, 59 minutes).
8. File credits (stored in terms of kilobytes) that the user can
download. This number is governed by the upload/download ratio you
have set in Drive.dat (see Utilities section for more information).
9. User privs. A list of the privilege bits and their functions is
contained in the file sys disk:access.dat.
10. Number of logfails. If a person gives an account number but the
wrong password for that account, a logfail will be recorded in that
account. When the real owner of that account logs in, if the number
is three or more, the message:
XX LOGFAILS SINCE LAST SUCCESSFUL LOGIN
will appear. XX is the number of times an incorrect password was
given for the account number. This number is reset to zero after a
successful login. If the logfails are high (5 and up), someone may
be attempting to break into this account, or the user has forgotten
his password.
11. Daily E-mail limit. Setting this to zero allows the user to send an
unlimited amount of mail. Valid limits are 1 through 255.
12. Other information that the different sections of the BBS may need
(whether the user voted on a topic, what the person's last post
4-1
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
number was (to tell if a message was posted before or after the last
time a person called in), whether the user needs linefeeds, has an 80
column screen, can display ANSI graphics, etc.)
The first user on the system (probably you) will be account number
(record number) one. Record zero is reserved for the 2AM-BBS authors so
that they can go in and do maintenance or upload utilities or updates
when necessary. The userlog will then contain one record for each user.
4.1.2 USER APPLICATION FILE
This file contains personal information. It is collected during the user
application procedure when a user logs in for the first time. The
following information is stored:
1. Person's last name
2. Person's first name
3. Person's street address
4. Person's city
5. Person's state (2 letter abbreviation)
6. Person's zip code
7. Person's voice phone number (area code mandatory)
8. Person's modem phone number
9. Person's age
10. A one line statement from the person as to where they heard about the
board.
11. Does the person want this information kept confidential (Y/N).
12. Bit encoded answers to up to three questions that you can pose during
the user application. Bit encoding is explained its own chapter in
this manual.
4.1.3 SYSTEM LOGS
The logs, sys disk:sys.log, sys disk:chat.log, sys disk:files.log,
sys disk:handle.log, and sys disk:gen.log are kept by the system. Syslog
(sys.log) keeps information about new users, system errors, BBS Lister
entries, and other information that you might need to know. Chat.log
keeps a record of all chat requests. Files.log keeps a record of all
files uploaded and downloaded through the Files section and the users who
transferred the files. Handle.log records all users who use the /name
command in the editor. Gen.log records logfails, carrier drops, and
system startup times. To read, copy, or delete these logs, use the [S]
command in the validator.
4.1.4 LOOKUP FILES
The directory look disk contains a set of user lookup tables. When
someone refers to a user by name (e.g. sending Email), these files are
4-2
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
consulted to find the person's usernumber. The lookup files are just
there to make access to the userlog quicker. They do not need to be
changed, and must always be present when the BBS is running. If there
are ever problems with them, you can delete all the files in look disk
and run the utility LOOKER.EXE (refer to the Utilities chapter of this
manual). It will regenerate the lookup tables by reading from the
userlog.
4.1.5 ACCESS.DAT
sys disk:access.dat contains descriptions of all the privilege bits. The
descriptions for each privlege bit are used when a user uses the [Y]our
status command off the main menu. You may view and edit the privlege
bits descriptions in the file with the [A] command in the validator.
Some privilege bits are reserved by the software; some are for you to
use. You may assign users privilege bits when you make up message bases
and protect files in and around the BBS.
4.2 PRIVILEGE BITS FOR NEW USERS
When a user logs in as new, he or she ONLY gets privlege bit 1 unless the
sysop has created the file NEWUSER.DAT in sys disk. (See the chapter on
new users for more information.) The rest (Email, FILES access, etc.),
may be given through the edit functions in the validator.
4.3 VALIDATOR COMMANDS
[E] - Edit User [V] - View User
[D] - Delete user [A] - Access list
[S] - Show a log [!] - View User applic.
[N] - New user validator [L] - Load Sweeper
[Q] - Quick scan users [R] - Range edit users
[W] - Wipe users [T] - Toggle security mode
[M] - Main Menu
The [E], [D], [V], [!], and [N] options all support either the username
or user number as parameters. Example:
VALIDATOR > D203
Or:
VALIDATOR > D DEAD ED
If you put the option without the argument, you will be prompted for more
information:
4-3
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
Validator > D
Username/number to delete > 203
1. [V]iew username or number. Displays the information in the user's
userlog record.
2. [!] username or number. Displays the information in the user's user
application record.
3. [E] username or number. Displays each field in the user's record to
you one field at a time and then stops and prompts you. Users may be
edited manually or with a definition (.DEF) file. If you hit return
here, the information will not be changed. If you type in new
information at this prompt, the information you just typed will
replace the old information. If you change a user's name, the
validator will ask you if the user lookup tables should be modified.
If the name change is not temporary, change the user lookup tables.
The user's record cannot be found (when sending email to the person,
etc) if the lookup tables are not modified. When changing usernames,
CHECK to make sure you don't assign two users the same username. Both
will be able to read each other's mail and the user lookup tables may
not function correctly. When it comes to the user privilege bits, all
the user privilege bits are shown and you are prompted to add or
delete privilege bits. You can specify ranges of privilege bits here.
Placing a minus sign (-) at the beginning of the line will delete
those privilege bits from the user. Hit RETURN when you are finished
adding or deleting privileges.
4. [N]ew user. Validates username, number, or return. (This option is a
shortcut for [!]username or number then [E]username or number.) If a
name or number is not supplied, the system gives you all the new users
in the SYS.LOG to be edited. It is recommended that you do not clear
the SYS.LOG until after this command has been used. First the user
application record is displayed. Then you are prompted to edit the
userlog fields.
5. [D]elete username or number. Will delete the user viewing the user
record and asking you to confirm.
6. [Q]uickscan users. This feature outputs a two line summary of the
user record for a range of users. Full range parsing is available.
Q* means quickscan all users. (NOTE: To see what the last active
record in the userlog is, use q9999. The last active record will be
displayed.)
7. [A]ccess allows you to maintain sys disk:access.dat. You may choose
to [E]dit a description for a privilege bit (normally done when you
assign it to something), [L]ist privlege bits (give a range of bits to
list or "*" to list all of them), or [S]can through the file looking
4-4
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
for a bit. When you scan, you will be asked for some characters to
match against. If you are trying to find the privlege bit to use
/load in the editor, for instance, give the characters "/load".
8. [S]how log allows you to look at a log. After the log is displayed,
you will be prompted to [m]ove, [p]rint, [e]rase, [c]opy, or [q]uit.
Copying a log will create a file with the number 1 appended to the
file name (i.e. SYS1.LOG). The [e]rase command will clear and restart
the log. The [m]ove command will first copy, then erase the log.
NOTE: Log files are just text files.
9. [R]ange editor allows you to change file credits, mail and time
limits, and privilege bits on a range of users. When prompted for one
of the first three items, you will have the option to change these,
relative to what they are already set for, by placing a plus (+) or a
minus (-) before this number. For example, using +5 for e-mail on a
user who has a 10 message e-mail limit will give that user a total of
15 e-mail messages. If a plus or minus is not supplied, the range
sets it exactly to the number given. NOTE: The range editor is a
powerful supplement to the sweeper.
10. [W]ipe users is a quick method of deleting a range of users. Use
this with the sweeper when purging users.
11. [T]oggle security mode. When security mode is activated, you can no
longer jump to DOS and privacy mode will be turned on. Privacy mode
blanks the screen when a user enters e-mail and for selected message
bases. When security mode is on, an S appears in the status bar at
the top of the screen.
12. [L]oad Sweeper. This is a feature of 2AM that allows you to select
users by almost any criteria you can think of. The sweeper is
explained below.
4.4 THE SWEEPER
The sweeper is enabled by selecting option "L" from the validator
([L]oad Sweeper). It allows the sysop to select a group of users based
on various criteria. The sysop can then edit or view those users in a
number of ways. Once in the sweeper, a question mark [?] will display
the sweeper menu. The sweeper is automatically cleared when you enter
the sweeper or exit the validator.
The following options can be used in the Sweeper:
A - Abort: Cancels and clears the sweeper, returning you to the
validator.
C - Call dates ( [F]irst and [L]ast ): Allows you to select users by
first or last call dates. Once a date is chosen, you are then asked
if you want the calls compared to calls made before, after, or on that
date .
4-5
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
E - E-mail limit: Allows you to select users based on their e-mail limits
F - File credits: Allows you to select users based on total file credits
H - Handles - [A]dd or [R]emove a specific handle: Allows you to add or
remove a specific handle to the sweeper at any time.
I - Input to sweeper from text file: Retrieves a file stored with the
[O]utput command. Enter a file name without any extension. Files
must be on sys_disk and have a .SWE extension (see "O" below).
M - Return to validator with data (Done): Brings you back to the
validator prompt. If the sweeper is loaded, you will see the message
"Sweeper is loaded". The next validator command that directly affects
users (i.e., range edit, quickscan) will effect that command for ALL
users in the sweeper list. After the sweeper list has been used, it
is cleared. If you wish to do more than one ranged function, output
the sweeper list to a text file (see below).
O - Output sweeper to text file: Outputs the current sweeper list into a
text file. Supply a file name only (no extenstion). 2AM will put all
text files created by the sweeper in the sys_disk with the extension
.SWE.
P - Privs: Allows you to create a sweeper list from a specific privilege
bit.
R - Range: Allows you to add users to the sweeper list via a range of
user numbers.
S - Show sweeper list: Outputs to the screen the list of users in the
sweeper.
T - Time allowed each day: Allows you to add users by time allowed.
Note: File credits, time, and e-mail limits all give you the option of
selecting a value greater than, less than, or equal to the value you
enter.
After entering a criteria into the sweeper using one of the above
options, you must select a sub-command. Sub-commands determine what is
to be done with users that match the criteria you entered. You can add
and remove users to the sweeper list via the various sub-commands. The
following sub-commands apply when adding/subtracting users to the sweeper
list:
[1] Add matches and remove non-matches
[2] Add non matches and remove matches
[3] Add matches only
[4] Add non matches only
[5] Remove matches only
[6] Remove non matches only
4-6
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
Example 1:
Below is an example of the purging users with [C]all date option. Users
who have not called since 1-23-88 are selected, then deleted using the
[W]ipe command.
Sweeper is empty
Sweeper >c
Which call? [F]irst, [L]ast, [Q]uit >L
Enter date to check against Last call date (xx-xx-xx) >01-23-88
Select users whose Last call is BEFORE/AFTER/ON this date? <B/A/O> >B
Selection option [1-6],[?] >3
Working..
Completed.
Users in Sweeper: 35
Sweeper >m
Sweeper Loaded
Validator >w
4 : CHRIS 01-17-87 -- 07-18-87
Delete this user ([Y]/n/q) >
(We cut out the other 34 users in the interests of brevity.)
Example 2:
Below is an example of using the [P]riv bit option. We selected all
users who have privlege bit 101, then removed all users who had privlege
bit 65.
Sweeper is empty
Sweeper >p
Enter the Priv to Check: 101
Selection option [1-6],[?] >3
Working...
Completed.
Users in Sweeper: 53
Sweeper >p
Enter the Priv to Check: 65
Selection option [1-6],[?] >5
Working...
Completed.
Users in Sweeper: 47
4-7
2AM BBS
Sysop's Manual User Validator
_________________________________________________________________________
4.5 PRIVILEGE BITS FOR THE VALIDATOR
The following privilege bits are reserved for the validator:
1. #89: User may enter the validator
2. #90: User may view user applications in the validator.
3. #91: User may view passwords when reading user records.
4. #92: RESERVED for future validator expansion
5. #93: User may edit user records in the validator.
6. #94: User may delete user records in the validator.
You can give limited validator access by giving out privilege bit #89,
bits #89 and #90 or privilege bits #89, #90 and #91. These combinations
allow partial viewing of user records.
4-8
2AM BBS
Sysop's Manual User Logins
_________________________________________________________________________
User Logins
Chapter 5
This chapter will describe the login process from the sysop's point of
view and point out some of the changes you can make to the new user
process.
5.1 NEW USER LOGINS
When first logging in, a user will get the Board Name, communications
parameters, and a <HIT RETURN> prompt. After hitting return, the file
text disk:start.txt is output. Most BBSes use this as an introduction to
the board. NOTE: this file, like most other files MUST exist or users
logging in will get "file not found" messages on their screens. If you
do not wish text to output in certain places (such as here), just create
a blank file.
The user will then answer some questions that will be used to set up his
or her account. Details of these questions are in the user's manual.
All the information that is entered here is stored in
sys disk:userlog.dat.
Next the file text disk:userapp.txt will be output. This marks the
beginning of the user application procedure. The user will then be asked
for real name, address, etc. This information is stored in
sys disk:userapp.dat. Most questions are pre-configured, but a few can
be modified by the sysop. There are three multiple choice questions that
can be asked in the user application process. Each question can have up
to 8 choices for answers. If you want to ask these questions, create any
of the following files:
text disk:appq1.txt
text disk:appq2.txt
text disk:appq3.txt
List the choices in the file with numbers next to each choice. This file
will be output and the user will be instructed:
Input all choices that apply
Input one choice per line
Hit RETURN on a blank line when done
Responses to these questions will be stored as three bit encoded numbers.
Bit encoding is discussed in its own chapter in this manual.
Each BBS has a policy for releasing information, and your policy should
be written up and saved in the file text disk:privacy.txt. A standard
statement usually goes something like:
5-1
2AM BBS
Sysop's Manual User Logins
_________________________________________________________________________
Do you mind if the sysop releases your account name to users of
similar interest? Under NO condition will your user information be
released without your permission.
This statement is followed by the text:
Do you agree to the above terms [Y/N] >
If the person answers NO, his or her user application will contain the
words "Information marked Confidential!"
Now, closing comments for the user application are output
(text disk:append.txt).
The user is assigned an account number and is then tested to make sure he
has written it down and remembered it.
Now the file text disk:nuser.txt (or nuser80.txt or nuser80x.txt) is
output. This file contains comments to the new user (board policy, any
special features or functions of the board, etc.).
After hitting return, the new user is placed where an old user would
first come into the board. The file text disk:notes.txt is output.
NOTE: this file is the file output for the "read bulletin" option (the
[+] option on the main menu).
5.2 THE STANDARD LOGIN
Any user can login with either his or her account number OR by typing his
or her user name at the first prompt. NOTE: if a user supplies an
illegal account name/password combination, the account with the incorrect
password will be marked as having a logfail on it. After 3 logfails, the
board will drop carrier on a user and will continue to drop carrier on
anyone who gives an incorrect name or password for that account.
Once the user has logged in, a check on their daily time limit is made.
If they have used all their time for the day, they are notified that they
have exceeded their daily time limit and the board resets. If the user
is attempting to log in from local mode and does not have privilege bit
72, they are given the message "Insufficient access to enter local mode"
and the board resets. When a user successfully logs in, the file
text disk:notes.txt will be output. Then some of the following lines
will appear:
Welcome USERNAME
You are caller number 44, 21 for today
Last caller was LAST USER
4 Logfails since last login
You have 3 new Email messages
New voting topics have been created
New trivia questions have been created
5-2
2AM BBS
Sysop's Manual User Logins
_________________________________________________________________________
The caller number and name of the last caller is stored in the file
sys disk:last. This file is specially formatted, and it should not be
changed.
If there were more than two logfails on the account, a notice of the form
above will be output. Also, if there is new Email for the user, the user
will be notified upon login as above. Note also that when new
trivia/voting topics are created, the user will get the last two lines in
the example.
5.3 NEWUSER.DAT
Newuser.dat allows you to alter the default configurations for new users.
The example below will use these defaults.
The file sys disk:newuser.dat can contain the configurations shown below,
or any variation you wish to grant a new user. Each line contains a
number to be assigned, followed by a description of what that number is
used for. The file must contain these items in the following order:
100 - File credits (in kilobytes) a new user can download before
uploading
0 - E-mail limit (0 equals no limit on e-mail messages per day)
35 - Time limit for a new user
1 - Privilege bit to give to new user
These quotas and privileges will automatically be given to all new users
on their first call. NOTE: Additional privileges can be added, one per
line, after the last line in this example. The descriptions after the
numbers are not necessary but help guide modification of the file.
Please note: Do NOT give out important privilege bits to new users. 2AM-
BBS will not allow you to grant bits 81 through 100 with this file. It
is recommended that sysops give out privilege bit 1. This bit is not
used by the program, but it is convenient to use for message base access
and it is the default bit to assign to all files, voting, and trivia
sections.
5.4 .DEF FILES
.DEF files are a fast method for sysops to edit users' accounts. The
format is identical to the format of NEWUSER.DAT above. If Time Limit,
E-Mail Limit of File Credits are 0 in a .DEF file, the users' current
values will not be altered. .DEF files allows a sysop to create lists of
standard privs that are given to validated users. Using .DEF files
insures that you give the same privilege bits to users when you are doing
some kind of standard account editing (ie: validating a new user).
5-3
2AM BBS
Sysop's Manual User Logins
_________________________________________________________________________
5.5 SPECIAL LOGIN MESSAGES
There are three special login messages that can be displayed when a user
logs in. Each is triggered by a privilege bit. If privilege bit #75 is
on, the file text disk:splogin1.txt is output. If privilege bit #76 is
on, the file text disk:splogin2.txt is output. If privilege bit #77 is
on, two things happen. The file text disk:splogin3.txt is output, and
the user is forced to fill out another new user application. Set
privilege bit #77 when a user supplies false information in the user
application. Then set up file splogin3.txt with some message indicating
that you rejected the application. The file will be output, and the user
will be taken to the user application section. Privilege bit #77 is
reserved for this purpose, but you are free to use the other two bits as
you see fit. NOTE: All three special login messages are non-abortable.
5.6 REJECTS.DAT
The file REJECTS.DAT in SYS_DISK can be used as a means of disabling
certain handles from being used by new users on your BBS. Pattern
matching is also available.
This is an example of the REJECTS.DAT file:
NEIL
*LARK
-*SYSOP
The above set of lines show all three possible modes selected in the
rejection list. The first line is an example of a direct pattern match.
If a user tried to create an account called NEIL then they would get the
message that that name is reserved or restricted on this bbs. The second
line would do the same thing, but restrict any handle containing LARK (ie
CLARKE, LARK BARK, LARKING). The final example performs the same as the
previous examples except that the "-" at the beginning of the line tells
it to let the person fill out an application before telling them the name
is bad. This option is there just in case you are really sick of people
using foul handles, and you want to make then suffer through the
application before they find out they can't use that handle. The system
puts them through the entire application procedure, but does not save
their information anywhere.
5-4
2AM BBS
Sysop's Manual The Editor
_________________________________________________________________________
The Editor
Chapter 6
The board has one editor, and it is called whenever you post a message on
a message base, in feedback, in Email, and in the BBS Lister. If you
wish, you can use the editor to edit text files as well using the /LOAD
and /SVE commands described below.
6.1 PRIVILEGED OPTIONS
All commands are explained in the user's manual except for three
privileged commands:
1. /LOAD will prompt you for a text file name, and will load that text
file into the editor. You will be placed right after the last line of
the file you have loaded in. You can then edit this file. REMEMBER:
the editor will only allow at most 100 lines, so if your file is
larger than 100 lines, it will be truncated.
2. /SVE will prompt you for a file name and will then save the contents
of the editor into that file. Using this feature, you can "/load" in
files and edit them and then "/sve" them. If you are editing a file
for the bbs or something like that, just "/a" (abort) out of the
editor after you are done editing (otherwise, the file will be saved
as a message). Note: You can overwrite files using "/sve". If the
file already exists, you will be prompted as to whether or not you
wish to overwrite it.
3. /NAME this command allows the user to change to name appearing in the
heading of a message. The name used must be a name that is not
currently in the user log. This prevents people from "impersonating"
other users. /NAME can NOT be used in email. Also /NAME can not be
used in certain types of message bases. Please refer to the Message
Base section of this manual for more information.
6.2 PRIVILEGE BITS USED
Privilege bits can be assigned to give users privilege to enter longer
messages into the editor. If you do not give any privilege bit out, the
user will have a 40 line editor. If you wish a user to be able to type
in more than 40 lines, you may use the following bits:
1. #78 - Gives a user a 60 line editor
2. #79 - Gives a user a 100 line editor
In addition, the following other privilege bits pertain to the editor:
1. #81 - /LOAD command in the editor
2. #82 - /SVE command in the editor
3. #87 - Allows change of handle (/NAME)
4. #80 - Allows ANSI color escapes sequences in the editor
6-1
2AM BBS
Sysop's Manual The Editor
_________________________________________________________________________
6-2
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
Message Bases
Chapter 7
7.1 FILE FORMATS
There are three files to each message base. These files are baseXX.ptr,
baseXX.dat, and baseinfo in the base_disk directory. (XX equals base
number.) Baseinfo is a directory of what bases are available. The file
contains all of the information necessary for accessing, describing, and
maintaining the bases. A base cannot be accessed unless there is a line
in baseinfo that refers to that base.
BASEINFO STRUCTURE
The following is the format for a line in baseinfo:
(| = one blank space)
base_number | read_priv | write_priv | maint_priv | base_window |
base_selection | base_name
OR
0 | priv to view comment | 0 | 0 | 0 | 0 | comment
1. Base_number is the number for the base. NOTE: it is not necessarily
the base number that every user sees. For instance, when a user goes
to base 3 the user will be taken to the third base in the baseinfo
file that he has access to. This may be any base number, not
necessarily physical base number three. The base number a user sees
is called the logical base number and will be dependent upon the
user's access level. The physical base number is the number you
assign the base in baseinfo. For example, a line in baseinfo
containing a base number of 3 will refer to files base3.ptr and
base3.dat. If this base is at the end of the baseinfo file, it may
have a logical number of 10 if it is the tenth base the user can
access. For the most part, you do not have to be concerned by logical
base numbers. They are automatically determined by 2AM according to
the order you list information in the baseinfo file. The physical
base numbers are used to determine what files will hold the message
for a specific base. In addition, the physical base numbers also are
used to select different base types. The following base numbers give
the sysop several options:
1-199 Normal bases
200-299 No /NAME allowed unless user has privilege bit 99 (system
access)
300-399 Anonymous posting is automatic
400-499 Real names are used automatically
500-699 Normal bases/privacy mode on
700-799 No /NAME without privilege bit 99/privacy mode on
800-899 Anonymous posting is automatic/privacy mode on
900-999 Real names are used/privacy mode on
7-1
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
Normal bases are bases in which there are no added restrictions or
features. Handle change (/NAME) is allowed on all bases from 1-199 and
500-699 if the user has the /NAME privilege bit.
Anonymous posts are messages in which the time is left blank and the
poster's name is changed to ANONYMOUS. This is an automatic feature
and cannot be overridden with /NAME.
Real name bases are bases that will change the user's handle to the name
that they supplied in their user application. This is an automatic
feature and cannot be overridden with /NAME.
Privacy mode will cause the screen to blank when a user enters this base
whenever security mode is enabled (see validator T command). NOTE:
Privacy mode will NOT go into effect during a local mode login.
2. Read_priv is the privilege bit necessary to read in this base. A user
will not know a base exists without read access to the base.
3. Write_priv is the privilege bit necessary to write in this base. You
may give a user read_priv for the base without write_priv if you wish.
If a user does not have the write privilege for the base, an asterisk
will appear next to the base name in the [S]how bases option.
4. Maintenance_priv is the privilege bit necessary to do maintenance in
this base. By giving each base a different maintenance privilege bit,
you can allow individual users to govern particular bases. With
maintenance privileges, a user can delete or edit any message on the
base. The user can also access base maintenance while on the base.
It is not necessary to give all bases different maintenance bits. If
you do not wish to give users maintenance access, assign it one of the
system bits such as 99.
5. Base_window allows you to set a finite amount of messages per base
that you wish to remain visible. Messages outside of this window will
not automatically be deleted. Messages may be retrieved if they
scroll off the window by altering the window size or by deleting newer
messages. Messages may be deleted by using the BSMaint Utility (see
Utilities chapter for more information.) A window of zero allows for
unlimited messages on that base.
6. Base_selection is one of the "invisible" privilege bits or zero. The
number assigned must be between 213 and 252 if you want to allow the
users to de-select this base. This option is used for the Read
Selected command. NOTE: whenever you create a new base, it would be a
good idea to grant all users the access bit you have assigned for this
field. If you assign this field a zero, a user cannot de-select the
base.
7. Base_name is the name of the base. Examples: "Public", "System News",
"IBM computer user's forum". The name can be up to 35 characters and
can contain any legitimate ASCII characters or ANSI color sequences.
7-2
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
The following is an example baseinfo line:
12 1 4 45 100 215 Public Base
12: The messages for "Public Base" are in base disk:base12.ptr and
base disk:base12.dat.
1: Anyone with privilege bit 1 can read messages in this base. If a
user does not have privilege bit 1, he or she will not even know that
this base exists.
4: Anyone with privilege bit 4 can post messages on this base if they
have privilege bit 1 as well.
45: Anyone with privilege bit 45 can do maintenance on this base if
they have privilege bit 1 as well.
100: is the maximum number of messages visible on this base.
215: is the privilege bit used for selection purposes.
An example baseinfo file:
1) 1 65 65 99 0 0 Feedback
2) 0 1 0 0 0 0
3) 0 1 0 0 0 0 System Boards
4) 0 1 0 0 0 0 :::::::::::::
5) 16 1 1 12 200 215 Public Base
6) 3 1 99 99 0 0 System News
The numbers in boldface are NOT part of the baseinfo file. They are for
referencing purposes only. Also, please note the spacing in the sample.
Please make your baseinfo file easy to read.
1. Feedback messages are in base 1 (ie. base1.dat and base1.ptr), and
feedback will appear as base 1 to any user with privilege bit 65.
You must have feedback as the FIRST base in the list, and you must
have privilege bit 65 in both the read and write fields.
Users are temporarily given privilege bit 65 whenever they leave
feedback. If you put ANY other number down, people will not be able
to send you feedback. Instead, feedback will go to the first base that
they have access to. If you want to make feedback public, this is a
good way to do it.
2. Comment line. This causes a blank line to be printed in the [S]how
bases command provided the user has privilege bit 1.
3. Comment line. This prints out the words "System Boards" to be printed
in the [S]how bases command provided the user has privilege bit 1.
7-3
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
4. Comment line. This prints out the underscore in the [S]how bases
command provided the user has privilege bit 1.
5. Public Base. Read access is privilege bit 1, write access is
privilege bit 1, maintenance access is privilege bit 12, window size
is 100, and selection is allowed with privilege bit 215.
6. System News. Read access is privilege bit 1, write access is
privilege bit 99, maintenance access is privilege bit 99, window size
is unlimited, and de-selection is not allowed.
The baseinfo file may be edited with any text editor, or you may use the
baseedit utility described in the utilities chapter. We highly recommend
you use the baseedit program provided with 2AM-BBS since it will reduce
the possibility of making errors when editing the baseinfo file.
.PTR AND .DAT FILES
2AM-BBS comes with a few of these files. Keep one baseXX.ptr and one
baseXX.dat file for feedback and assign the rest to user bases. You can
create more base files with the [X] option in maintenance (see below) or
with the BASEEDIT program covered in the utilities section of this
manual.
7.2 BASE MAINTENANCE
A user can do maintenance on a base if he or she has the master base
maintenance privilege bit (86) or the privilege bit to do maintenance on
that particular base. Base maintenance allows the following:
1. In a [S]how bases command, a dash '-' will appear next to any base
that a user has base maintenance privileges for.
2. Users with base maintenance privileges can read deleted messages and
undelete messages (from the maintenance section).
3. Users with base maintenance privilege bits have the option to compact
deleted messages. A compacted message cannot be undeleted. If you
choose to compact a deleted message, any number from 1 to the size of
the base (ie., 200) is valid. NOTE: The closer to the beginning of
the base, the longer it takes. Compacting from message one causes the
compaction to run through the entire base. It is recommended that you
compact from the message previous to the one being deleted.
4. Users with base maintenance can delete or edit any message on the
base, or delete a range of messages.
7-4
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
Typing "maint" from any base prompt puts you into the base maintenance
section. Typing "m" will get you back to the main base prompt. The
following options are available:
1. [X] Base Create. This option allows a user to generate new baseXX.dat
and baseXX.ptr files. Bases cannot be seen by the public until there
is a line for the base in baseinfo. When creating a base, you will be
prompted for the physical base number of the base (the number that
corresponds to the XX in the baseXX.ptr and baseXX.dat files). Don't
confuse this physical base number with the logical base number. If
you try to create a base and it already exists, you will be prompted
as to whether or not you want to overwrite the existing files. If you
choose yes, the messages will be erased and a new base will be
generated. A user needs privilege bit 85 to create bases.
2. [U]ndelete messages. Any message that is marked deleted can be
undeleted here. NOTE: compacted messages are lost forever. Only
messages marked "Deleted" in their header may be undeleted.
3. [C]opy Message. Allows a user to copy a message to another base. You
may copy either by the logical base number or by the base name.
(Example: in copying a message to the feedback base, you can enter
"Feedback" or any significant string of characters from that base
name.) A user needs privilege bit 83 to copy messages.
4. [G]rant access. Allows a base-op to grant users read and write access
to a base. Users may be entered by handle only.
5. [R]emove access. Allows a base-op to remove users' read and write
access to a base. Users may be entered by handle only. NOTE: If you
use the same privilege bit to read or write on more than one base, and
a baseop removes a user's privilege for one of those bases, the user
loses access to ALL bases containing the same read/write privilege
bit.
6. [L]ist users. This prints out a list of all users with read, write,
and maintenance access to a base. Asterisks appear in the appropriate
category for each user.
7. [W]ho command. This shows the actual handle of users who posted a
message or range of messages. It is used as a quick way of
determining who changed handles in a message base. It may also be
used on bases that are restricted to anonymous or real name posting.
8. [I]nformation command. This allows a base-op to create the base
information (the message that is displayed via the "I" command in the
bases). When you type "I" from base maintenance, you are put into the
editor of the current base information message. If base information
does not exist, just input what you want the message to contain. If
the base information already exists, you will be placed at the last
line of the current base information message. You must restart or
7-5
2AM BBS
Sysop's Manual Message Bases
_________________________________________________________________________
delete the current message if you want to change the information
completely.
7.3 PRIVILEGE BITS USED
1. You may reserve whatever unused privilege bits you want to give a user
read access, write access, and maintenance access to a base. You
specify the privilege to read and/or write to a base in the file
base disk:baseinfo (described above). Use the access list in the
validator to see which bits are currently unused. When you reserve a
privilege bit, add it to your access list so that you have an accurate
record of what bits you used.
2. Privilege bit #65 allows a user to read/write in feedback.
3. Privilege bit #83 allows a user to copy messages.
4. Privilege bit #85 allows a user to create bases.
5. Privilege bit #86 gives the user master base maintenance privileges
7.4 BASE CLEANUPS
When messages are deleted or edited, excess data collects in the base
files. Running the utility BSMAINT (see Utilities chapter for complete
information) cleans out the excess data and compresses the message bases.
NOTE: if you want to completely wipe a base, just use the base create
option in maint. It will delete the old base files and generate new,
empty ones.
7-6
2AM BBS
Sysop's Manual Email
_________________________________________________________________________
Email
Chapter 8
8.1 EMAIL COMMANDS
The following commands can be issued by any user who has access to the
email section of 2AM-BBS:
1. [M] - Return to main menu.
2. [P] - Post. Send an email message to a user. If you would like to
send the same message to several people, enter all their account
names separated by a comma. For example:
E-mail > P CAT, LARRY E., CHRIS,TV
will send the message to users: CAT, LARRY E., CHRIS and TV all at
once.
3. [R] - Read email. You will be asked if you would like to read your
incoming or outgoing mail. You could enter [RI] or [RO] to read
you mail thus avoiding the prompt 2AM displays if you enter only an
[R].
4. [L] - List all your email messages that are still outgoing.
5. [U] - User lookup. This is identical to the [U] option on the main
menu.
6. [H] - Identical to every menu in 2AM-BBS, option [H] calls the help
system.
During a Read Incoming, a user has the ability to:
1. [A] - Answer the message
2. [F] - Forward the message to another user.
3. [N] - Go to the next message. Note - this option will DELETE the
currently displayed message.
4. [R] - Re-Read the currently displayed message.
8.2 SPECIAL OPTIONS DURING READ INCOMING
There are two extra options in the Email read incoming command that the
sysop has control over. The first is the option to [D]isksave a message,
and the second is to [S]kip a message. These functions need individual
privilege bits (listed at the end of the chapter).
[D]isksave prompts you for a file name (to be stored in MAIL_DISK), and
then saves the message.
[S]kip message allows the reader to pass by this message without deleting
it. A skipped message will remain in the user's mail file. It will
appear every time the user reads incoming mail until it is deleted with
the [N]ext message command.
8-1
2AM BBS
Sysop's Manual Email
_________________________________________________________________________
8.3 MAINTENANCE COMMANDS
There are two maintenance commands in the Email section. These commands
are used to view mail and print a list of a user's outgoing mail. They
both require the Email maintenance privilege bit.
By adding a username to the [L] command, one may get the outgoing list
for that username. For example
E-Mail > L MADD HATTER
will give the outgoing mail listing for the user named MADD HATTER,
instead of your own list.
The second maintenance command is SPY. [SPY] allows you to view a user's
incoming and outgoing mail as if you were that user. All the prompts
will be the same and have the same effect as if that user executed them.
In other words, using the Answer option in a SPY on a user's incoming
mail will allow you to answer as that particular user. It will in no way
state that you, and not the user, answered that mail. It is not expected
that this option will be used, as it is rather unethical. NOTE: This
option automatically gives you access to skip Email messages. NOTE: In
SPYing on a user's incoming mail, the [N]ext message command will delete
the message. Use skip to go onto the next letter.
Example:
E-Mail > SPY MADD HATTER
will prompt you as to whether you wish to read incoming, outgoing, or
both, and then read MADD HATTER's mail as if you were him.
8.4 FILES
All files pertaining to Email are stored in MAIL_DISK. The files are as
follows: (XX = usernumber)
minXX.dat Incoming mail data file for user XX.
minXX.ptr Incoming mail pointer file for user XX.
moutXX. Outgoing mail pointers for user XX.
Each mail file is self-maintaining. When a user is deleted, so are all
their mail files, but not their outgoing messages. NOTE: Once a user is
deleted, you will be unable to list their outgoing messages. NOTE: The
message "Message count for this user incorrect" may appear if a user has
had outgoing mail to a user who has since been deleted.
All mail files are referenced by usernumber. Thus, changing a user's
handle will have no effect on their incoming mail, but other users will
8-2
2AM BBS
Sysop's Manual Email
_________________________________________________________________________
not be able to list outgoing messages to a user whose handle you have
changed. Also, if you changed a user's handle, they will not be able to
read their outgoing mail written with their old handle.
8.5 PRIVILEGE BITS AND MAIL QUOTAS
2 - Access to Email
60 - Skip messages in RI
62 - Email Maintenance
63 - Disksave messages in RI
Email quotas may be set on individual users. It is often used on
multiuser boards to prevent people from having online conversations via
Email. The quota may be set at any number from 1 to 254. Setting the
mail limit to 0 allows a user unlimited Email messages.
8-3
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
FILES Section
Chapter 9
9.1 FILE CREDITS AND TIMES
In your DRIVE.DAT file there are three fields that control parts of the
files section. The first allows you to set a file credit system based on
the number of Kilobytes (K) a user uploads. This number is multiplied by
the amount in K that the user uploads, and then added to the users file
credits. The other two fields control the opening and closing times for
the files section. (This is overridden if the user has privilege bit
64). Setting these two times to equal values leaves the Files Section
open 24 hours a day. However, setting these to two different values will
allow you to open and close your Files Section during certain parts of
the day. If you wish to change these settings at any time, use the
utility DRIVER (for more information, see the chapter on Utilities).
9.2 FILE FORMATS
There are several files you will use in managing uploads and downloads.
You will note that there are two directories for the FILES utility, one
for uploads (uload_disk) and one for downloads (dload_disk).
9.2.1. DOWNLOAD FILES
There are two sets of files for downloads. The first file is
dload_disk:library.dat. It holds the titles of all the libraries
available, and you will create it yourself with a text editor. The
format for each line is as follows: (| = one space)
privilege bit to access | library number | library name
OR
0 | privilege bit to read comment | comment
Below is a sample library.dat for two sets of libraries, one accessed by
privilege bit #22 and one accessed by privilege bit #23:
9-1
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
0 22
0 22 Normal libraries for priv #22 users
0 22
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:::::::
0 22
22 8 Games
22 7 Utilities
0 23
0 23 Libraries for priv #23 users
0 23
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
0 23
23 4 Pascal programs
23 6 Cobol programs
71 0 Upload directory
0 1
Please note that the upload directory has a file number of 0 and a
privilege number of 71. This entry must be in library.dat or you will
not be able to process uploads. Also noticed that the files do not have
to be in numerical order. The user will view the files sections in
numerical order. In the above example, a user with privilege bit 22 will
see the Games directory as directory 1, even though it is physically
directory 8. If a user does not have access to any files sections, he
will not be allowed into the files area.
The other set of files are dload disk:dirX.dat. They are the directories
of files for library section X. Each has the following format: (| = one
blank space)
Privilege bit to access | Entry type | Disk file name
Filename to display | Number of bytes | Date | Description
OR
Privilege bit to access | 0
Comment line
There are four entry types, numbering from one to four.
1 - Non-readable
2 - Readable
3 - Free Non-readable
4 - Free and readable
9-2
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
A free file is one that may be downloaded with the loss of any download
credits. A readable file is a text file in the downloader. A non-
readable file is a program or archive.
Example:
1 0
# Filename Bytes Date Description
1 0
----------------------------------------------------
1 1 C:\PROG1.COM
PROG1.COM 21888 11-15-87 PROGRAM TO TIE SHOES
4 3 C:\FW\BBS\UMAN\OUTPUT\2AMUSER.ARC
2AMUSER.ARC 36944 11-15-87 2AM USER'S MANUAL (FREE DOWNLOAD)
1 0
THIS IS A COMMENT -- NOTE THE ZERO IN THE COMMENT FIELD
1 2 C:\BBS\DLOAD\THINKER.DOC
THINKER.DOC 1031 11-15-87 COMPUTER THOUGHT (READ ME)
9.2.2. UPLOAD FILES
1. The uploaded files themselves are called uload disk:up-XX.YY where XX
is the upload number and YY is the port number (if the system is
running more than one).
2. uload disk:lastu.dat contains the number of the last upload. It will
be created automatically when an upload is made if it does not exist.
3. text disk:uplod.txt is a non-abortable text file that will be output
when a user requests an upload. It is normally used to explain system
rules concerning uploads.
9.2.3. EXTERNAL PROTOCOLS
This option allows the sysop to add additional file transfer protocols.
There are three variables that may be passed to these programs. BAUDRATE
(note uppercase), COMPORT, and NAME. BAUDRATE is the buad rate the user
is calling at. COMPORT is the COM port the user is on. NAME is the
filename to send/receive. All but NAME are optional.
1. dload disk:protocol.dat contains the necessary information for calling
external download protocols.
2. uload disk:protocol.dat contains the necessary information for calling
external upload protocols.
The format for these files, is two lines for each protocol. The first
line contains the protocol and necessary information. The second line
contains the name of the protocol that you wish to display in the list.
Example:
9-3
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
%C:\PROTOCOL\DSZ.COM port COMPORT speed BAUDRATE D sz NAME
Zmodem
%C:\PROTOCOL\DSZ.COM port COMPORT speed BAUDRATE D sb -k NAME
Ymodem 1K (True Ymodem)
%C:\PROTOCOL\DSZ.COM port COMPORT speed BAUDRATE D sx -k NAME
Xmodem 1K
The above example shows you how to use Omen Technologies DSZ external
protocol program for downloads. This file would reside in DLOAD_DISK.
NOTE: There are percent signs at the beginning of each program line to
let the BBS know that these are .COM/.EXE files. They follow the same
format used by JUMPDOORs.
9.3 THE MAINTENANCE UTILITY
This utility in the FILES section is accessed by typing "maint" at one of
the FILES prompts. You will need privilege bit #64 to access this
maintenance section. There are different maintenace options depending on
whether you are in the upload library or one of the files libraries.
9.3.1 FROM A FILE LIBRARY
When calling MAINTENANCE from any library (except the upload library),
you have several options:
1. Add [C]omment. You are asked for the comment to add and the privilege
to view it. It is placed at the end of the library listing.
2. Add [F]ile. You are asked for:
1) Privilege bit to read the file (default is 1)
2) Full Filename on Disk (include drive name and path)
3) Description (up to 40 characters) for the file.
4) File type (1 through 4)
The MAINTENANCE utility will stamp the date and size into the entry
and add it to the end of the library list.
3. [U]pdate dir. All files in the directory will be checked to see if
they exist. If a file is not found on the disk, but is listed in the
library, it will be listed and you will be asked if you want to keep
it in the directory. An answer of [Y] will write the word 'OFFLINE'
as the size of the file, but leave the directory entry. An answer of
[N] will remove the file entry from the library directory.
If you want to put comments in the middle of the list, move files around,
or do any other fancy stuff, you will have to edit the dirX.dat file,
taking care to stick to the proper format.
9-4
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
9.3.2 FROM THE UPLOAD LIBRARY
If you are in the upload library and type MAINTENANCE you will get two
options:
Would you like to move files to their proper directories ([Y],n)
File movement will show you each upload listing in reverse order (from
the end of the library list to the beginning) and ask questions
pertaining to what should be done with the file:
Do you wish to keep this file [Y]/N/Save
1. Hitting N erases the file and entry and skips the rest of the
questions.
2. Hitting S asks for a new name for the file. The file cannot be moved
out of the uload_disk directory with this command, so DO NOT put a
drive name or path name in the file name. Use the Save command for
files that you wish to keep for yourself and not put in file
libraries.
3. Hitting Y (or return) continues.
New disk filename for file >. Give the filename that you wish the upload
to be renamed to. Include drive and path!
Privilege bit to download DEF=1. Give the privilege bit necessary to
download the file.
Which library to add to. Give the library number you wish to add the
upload to. Hit "?" if you forget the list and the list of libraries will
be output.
Can this file be read online y/[N]? This is to differentiate text files
from program or archived files.
Process next file [Y]/N. Hit Y or RETURN to keep going, N to stop.
At the end, the message:
No uploads online at this time
will appear. All uploads have been moved into libraries, deleted or
renamed.
9.4 PRIVILEGE BITS USED
1. The user must have user privilege bit #7 on to download at 300 baud.
2. The user must have privilege bit #8 to download at 1200 or 2400 baud.
3. When downloading, a user is not allowed to go seriously over his or
her time limit. The time limit is checked before the transfer is
9-5
2AM BBS
Sysop's Manual Files
_________________________________________________________________________
started. A transfer is never aborted halfway through. If you wish to
allow users to exceed their time limits for a download by any amount
(some may not be able to download a large file in the time allotted
them), give them privilege bit #9.
4. Privilege bits to download each individual file are stored in the
library files.
5. Privilege bit to access the maintenance utility is 64.
6. Privilege bit to access the upload library is 71. More about the
upload library in the section on upload files.
7. If an upload is marked for the sysop only ('/' as first character of
the description), it will have privilege bit 99 to access it.
9-6
2AM BBS
Sysop's Manual BBS Lister
_________________________________________________________________________
BBS Lister
Chapter 10
This utility will keep statistics on other BBSes and will allow you to
compile lists of boards based on several criteria.
10.1 FILE FORMATS
Three files are used: bbs disk:bbslist.dat, bbs disk:bbslist.ptr and
bbs disk:bbslist.sr1. They are all random access and thus cannot be
typed out or edited. Each will be automatically created when the first
entry is made for it.
10.2 MAINTENANCE COMMANDS
In maintenance, the following commands are available:
1. [D]elete board. You will be asked for the entry number and the board
listing will be removed from the database.
2. [E]dit board. You will be asked to re-enter the entire BBS
description.
3. [U]ndelete board. You will be asked for the entry number and the
board listing will be reinstated to the database.
10.3 PRIVILEGE BITS USED
1. Privilege bit #69 allows a user to add one board to the list. After
the board is added, this privilege bit is automatically revoked.
2. Privilege bit #70 allows a user to add any number of boards. This bit
is not taken away after adding a board.
3. Privilege bit #61 allows a user to access the maintenance commands for
this module.
10-1
2AM BBS
Sysop's Manual Jumpdoor
_________________________________________________________________________
JumpDoors
Chapter 11
This allows you to offer programs that the other users can run. These
programs can be anything that fits in memory and can communicate through
the serial (modem) port. If the sysop wishes to run programs in local
mode only, then serial port support is not required.
11.1 FILE FORMATS
Two files are used by JumpDoors: jump disk:Passages.dat and
jump disk:Jumper.dat.
11.1.1 JUMP_DISK:PASSAGES.DAT
This is the library of available JumpDoors. This file is not required to
operate the BBS. It is only necessary if you wish to make jumpdoors
available. Each entry in the file takes two lines and has the format: (|
= one blank space).
Priv | local | full file name and command line
Description
Or:
0
Comment
Priv is the privilege required to use the jumpdoor. Any user with this
privilege set will be able to see and use this jumpdoor. Local is 1 if
the program can only be used from the console, otherwise it should be 0.
File or command name is the full file name and command line. The command
line is optional. NOTE: People running multi-user versions of 2AM-BBS
may wish to pass the port number to a jumpdoor. To do this, place
PORTNUM (please note uppercase) in the command line. When the BBS
executes this door, it will translate PORTNUM to the actual port number.
.COM and .EXE programs should have a % sign in front of them to identify
them as such. Otherwise, a " /c " (single space before and after /c)
must be used. These conditions are automatically added if the door is
installed via the maintenance section. Description is the title of the
jumpdoor output in the [S]how command.
Example:
0 0
Jumpdoors Available
0 0
:::::::::::::::::::::::::
11-1
2AM BBS
Sysop's Manual Jumpdoor
_________________________________________________________________________
0 0
99 0 %C:\2AM\UTILS\BSMAINT.EXE C:\BBS\BASES\ N BASEINFO.ALT
Compress bases with Alternate Baseinfo and BSMAINT
1 0 /c c:\bbs\jump\chess.bat PORTNUM
Play Chess
The above example shows three types of entries: comments, exe/com file,
and other file types. Note the placement of the percent and the " /c" in
the above example.
11.1.2 JUMP_DISK:JUMPER.DAT
This is a file that the BBS writes before it sends a user through a door.
It contains some information about the user that any jumpdoor program can
make use of if it wishes. The file is a text file and contains the
following (each item on a separate line):
1. System Name
2. System Owner
3. Username
4. Usernumber (i.e. account number)
5. User's first name (from application)
6. User's last name (from application)
7. User's City, State
8. Time Remaining
9. Communications port (1 or 2).
10. Baud rate ('300','1200','2400')
11. Number of nulls needed (an integer from 0 to 15).
12. Linefeeds? 'TRUE' if user needs linefeeds. Otherwise: 'FALSE'.
13. Upper Case only? 'TRUE' or 'FALSE'.
14. 80 columns? 'TRUE' or 'FALSE'.
15. IBM Graphics? 'TRUE' or 'FALSE'
16. Ansi menus? 'TRUE' if the user can display ANSI, otherwise
'FALSE'.
17. Bell? 'TRUE' or 'FALSE'. Current setting of the system bell.
11.2 THE MAINTENANCE UTILITY
Maintenance is accessed by typing MAINT at the jumpdoors prompt. Users
need privilege bit #100 to use jumpdoors maint. It will add jumpdoors or
comments to jump disk:passages.dat. It will automatically create this
file if it does not exist.
If you select add [C]omment, you will be prompted for a comment to add to
jump disk:passages.dat. If you select add [J]umpdoor, you will be asked
the following:
1. Priv bit to use [DEF=1]. Give the privilege bit that a user must have
to use this jumpdoor.
11-2
2AM BBS
Sysop's Manual Jumpdoor
_________________________________________________________________________
2. Local mode only Y/N. If the jumpdoor cannot communicate through the
serial port, select NO here.
3. Full name of program or command. Give the full name of the program to
be executed, including drive and path and extension. Also include the
command line (ie. c:\myprogs\vroom.com 1 PORTNUM).
4. Is this a COM or EXE file? Answer yes or no. (Is the extension of
this program .COM or .EXE?)
5. Description. This is what will be displayed in the [S]how jumpdoors
command.
11.3 NOTES ON WRITING JUMPDOORS
The jumpdoor must send its output to the screen and serial port to be
useful to users who call through the modem port. 2AM-BBS de-installs all
its serial input and output routines when it exits to a jumpdoor, so it
will not interfere with modem communications. You may install jumpdoors
for programs that do not access the serial port, but users who call in
cannot use them. Be sure to mark these programs as LOCAL only (as shown
above) so users do not get stuck in them.
Any program that uses the serial port should run as a jumpdoor. Please
ensure, however, that it does NOT:
1. Reset or change anything in the modem.
2. Change the baudrate, parity, etc. You may disconnect the user with
these actions.
3. Permanently alter any interrupts or interfere with memory used by the
bbs. 2AM-BBS is in memory along with the door and will not work if
you write all over it, obviously.
Jumpdoors can be written in any language (C, Pascal, Basic, etc, or even
assembly language). Libraries of serial input/output procedures are
readily available both commercially and in the public domain.
If you write a jumpdoor, the 2AM Associates would be most interested in
seeing it and, if it does anything reasonable, will be glad to distribute
it with the BBS package if you wish.
11.4 PRIVILEGE BITS USED
Users must have privilege bit #100 to do jumpdoors maintenance.
Privileges to access each individual jumpdoor is kept in the jumpdoors
files.
11-3
2AM BBS
Sysop's Manual Trivia
_________________________________________________________________________
Trivia
Chapter 12
This section lets you create sets of trivia questions for your users to
answer. Scores must be manually tallied by the sysop or a user with
trivia maintenance.
12.1 FILE FORMATS
For all sections below, X refers to the physical trivia section number.
As in the message bases, the physical numbers may not always be the same
as the logical numbers. For instance, the prompt may tell you that you
are in Trivia Section 3, but may actually be in any physical section 1
through 20.
1. trivia.lvl - This is a text file that you must create or modify.
Each entry in this file consists of two numbers followed by a title.
The first number is the privilege bit to access the section or
library. If this value is set to 0 then the text is considered a
comment field. The second number is the physical file number except
in comment lines. In comment lines, the second number is the
privilege bit needed to view the comment. This number is used to
associate the section with a set of corresponding files. The numbers
used in this field must be between 1 and 20. Note: This is the same
layout used for the LIBRARY.DAT file in the FILES section.
Example: (| = one space)
0 | 1 |
0 | 1 | Trivia Sections Available
0 | 1 | ::::::::::::::::::::::::::::::::::::::::::::::::::
1 | 3 | General Trivia
20 | 8 | Star Trek Trivia
20 | 2 | Computer Trivia
0 | 1 |
In the above example, users with privilege bit 1 will see only General
Trivia and all the comment lines. Users who also have privilege bit 20
will see all three sections.
2. trivqX.dat - These files are created with the [C] option in maint. It
holds between 1 and 10 trivia questions that are currently available
in trivia section X. If you are in trivia section X and this file
does not exist, when you try to answer the questions, the message: 'No
Questions Available in this group' will appear.
3. trivaX.dat - These files contain the questions and answers for the
last trivia set if one exists. If you are in trivia section X and
this file does not exist, when you ask for last week's answers, the
message 'No answers available' will appear.
12-1
2AM BBS
Sysop's Manual Trivia
_________________________________________________________________________
4. tscorcX.dat - These files contain the current scores for section X,
sorted according to percentage. This file is automatically restarted
when you create new questions. If this file does not exist or is
empty, the message 'No scores compiled' will appear if you ask for the
scores option.
5. tscorlX.dat - These files contain the last set of scores for section
X, sorted according to percentage. This file is automatically
generated when you create new questions. If this file does not exist
or is empty, the message 'No scores compiled' will appear if you ask
for the scores option.
6. tansX.dat - These files contain answers to questions for trivia
section X that have not been graded yet. When you view and correct
these responses, these files will be altered. If this file does not
exist, there are no uncorrected trivia answers.
12.2 MAINTENANCE SECTION
The "MAINT" command allows you to create question files, correct answers,
and allow certain users to retake trivia. A user with privileges to
maintain a trivia section will see a "-" before the section name when
listing the available sections. With this section, you can have users
correct trivia scores. This command may be accessed if you have either
master trivia maintenance or trivia maintenance for that physical
section. Privileges for each physical section are bits 193 through 212
and are in sequential order for each section. The following commands are
available:
1. [C]reate question set - The first thing this does is check to see if a
question set already exists. If there is an active question set, you
are forced to answer each question. These answers are then used to
create the trivax.dat file (described above). You then can input a
new set of up to 10 questions. Each question may take up to five
lines. If you do not use all five lines, just leave it blank by
hitting return. The old and new score files are then created. All
user accounts with the appropriate privilege bits are then granted the
ability to take these questions and are notified that new questions
have been created.
2. [A]nswer correct - If there are answers that have not been corrected,
they are output here for grading. If there are no new answers, you
will be told so. The trivia questions and users' answers will be
displayed one at a time. You have the option of giving full or
partial credit for each answer. If you only wish to see the answers,
select [D] and the questions will no longer be displayed. Hitting [D]
again will re-display the questions. If you see the word 'quit' for
any answer, you know the person has aborted the question set. After
you correct the questions for a user, you will be prompted as to
12-2
2AM BBS
Sysop's Manual Trivia
_________________________________________________________________________
whether or not you wish to adjust the score. After this you will be
prompted to either save and go on to the next user, save and quit,
skip this score and go on to the next user, or skip this score and
quit from grading.
3. [M]odify taker. A person is only allowed to answer trivia questions
once. If you wish to allow a user to retake a set of trivia
questions, use this option. You will be asked for the name of the
user. If that person exists, he will then be allowed to re-answer the
questions. Note for multi-user systems: If the person is online
while you are modifying his account, it will have no effect.
12.3 PRIVILEGE BITS USED
Privilege bits to do maintenance in a trivia section range from 193 to
212 for trivia sections 1 to 20 respectively. Master trivia maintenance
is privilege bit 67.
12-3
2AM BBS
Sysop's Manual Voter
_________________________________________________________________________
Voter
Chapter 13
In the 2AM-BBS voter, you can create up to 24 topics with between 2 and
10 choices for each topic.
13.1 FILE FORMAT
The only file for this section is vote disk:voter.dat. All topics,
descriptions and votes are kept here. Use the utility MAKEVOTE.EXE to
create or reset this file if necessary.
13.2 MAINTENANCE COMMANDS
The maintenance section is accessible to anyone with privilege bit 68 and
contains the following commands:
1. [C]reate vote topic allows you to create a topic. All topics are in
sequential order according to the date they were created. Users with
the correct privilege bits will be notified when a new voting topic is
created. When you make up a voting topic, you will be prompted for
the following information:
1) Vote priv: Privilege to view and use this topic
2) Topic Title: This is what is displayed with the [S]how topics
command.
3) A three-line description of the topic.
4) Between 2 and 10 answers of no more than 35 characters each.
2. [D]elete vote topic. You are prompted for the topic to delete.
13.3 PRIVILEGE BITS USED
Privilege bit 68 is the maintenance bit for the voter.
Privileges for individual voting topics are determined by the sysop when
creating a voting topic.
13-1
2AM BBS
Sysop's Manual Chat
_________________________________________________________________________
Chat
Chapter 14
Chat is used to speak directly to a user. Everything you type will
appear on your screen as well as the on the user's screen.
14.1 REQUEST CHAT
When a user types "chat" from the main menu, he will be prompted for a
reason (in 80 characters or less). The chat page is a series of nine
bells. If the sysop does not answer by the last bell, the user is put
back at main menu. A "C" will be placed in the status line at the top of
the screen that will stay there for the rest of the user's login or until
the sysop answers chat. The reason for the chat request remains stored
in memory.
14.2 ACCEPT/DENY CHAT
The sysop can accept/deny chat by hitting the ESCAPE key. You are
prompted for the following: [A]ccept, [D]eny, [C]ustom, [N]o Message.
All but the last option outputs a text file (see below). The sysop can
initiate chat anywhere but at a single-character input prompt and during
a file transfer. If the user has already requested chat, the reason will
be displayed when you hit the escape key. After you accept chat, the "C"
will disappear from the status line.
14.3 LEAVING CHAT
To leave chat, hit the ESCAPE key again. You are prompted for the
following: [R]eturn user, [D]ump file. The [D]ump file option will allow
you to dump an ASCII text file from your computer to the user's screen.
You cannot dump a program to the screen. It is strongly recommended that
you only dump ASCII text files, as other files may have unpredictable
results on yours or your users' screens.
14.4 CHAT FILES
Chat uses the following files:
1. chat disk:chat.req: This file is output when a user requests chat.
It is usually on the order of, "Why do you request chat?"
2. chat disk:chat.acc: This file is output if you accept a user's
request.
3. chat disk:chat.abt: This file is output if the user hits the return
key at the reason prompt.
4. chat disk:chat.ext: This file is output when you leave chat.
14-1
2AM BBS
Sysop's Manual Chat
_________________________________________________________________________
5. chat disk:chat.den: This file is output if you do not get back to the
user requesting chat. It basically says "could not find sysop".
6. chat disk:chat.dni: This file is output if you select to deny chat.
7. chat disk:chat.2nd: This file is output if the user tries to call
chat a second time without the sysop having accepted the first call.
A log of chat requests is kept in memory. For more information, see the
validator section.
14-2
2AM BBS
Sysop's Manual Other Main Menu Options
_________________________________________________________________________
Other Main Menu Options...
Chapter 15
15.1 CONFIGURE
The Configure Utility allows a user to configure the BBS to his computer
and terminal program, as well as to his own likings. All of this
information is kept in sys disk:userlog.dat, but can only be changed by
the user. There are no sysop options here. All the options are covered
in the user's manual.
15.2 FEEDBACK
This option is available during logoff or if you hit "F" at the main
menu. Feedback is a way for users to communicate quickly with the
sysop(s). The privilege bit for feedback is 65. For more information on
feedback, there is a section on it in the message base chapter.
15.3 SYSTEM INFO
This command is invoked by typing "I" at the main menu. System info
outputs the text file text disk:sysin.txt. Appending an '80' or '80x' to
the filename will output an 80 column or ANSI version of the file if
these files exist. This file normally contains:
1. Computer Type
2. Memory and Storage
3. Peripherals on system (printer/modem/etc.)
4. Serial number of 2AM-BBS you are running
5. Any other system specific information.
However, you may put any information in it that you wish.
15.4 OFF
The file text disk:offnotes.txt is output when a user logs off. Many
sysops use the logoff notes to list other BBSes that they are affiliated
with.
15.5 DAILY LOG
The caller's log for the current day is stored as log disk:mm-dd-yy.log
where mm is current month, dd is current day and yy is current year. All
the old logs for any past days will be here as well (in log_disk). You
may keep as many logs around as you wish. When you need space, delete
some old logs. If a user tries to read a deleted log, he will be
15-1
2AM BBS
Sysop's Manual Other Main Menu Options
_________________________________________________________________________
notified that the log for that day is unavailable. DAYVIEW (see the
chapter on utilities) allows the sysop to read and delete log entries.
15.6 LOGIN NOTES
If you hit "+" at the main menu, the file text disk:notes.txt will be
output. If 'notes80.txt' or 'notes80x.txt' exist, they will be output as
appropriate. This is the same file that is displayed when a user logs
in.
15.7 USER APPLICATION
If a user is online and you would like him to refile his user
application, give him privilege bit 77 and type "!" at main menu. (See
the chapter on Keyboard Functions for more information on editing users
online.) It is used primarily to force people who have filed false
information to refile correctly.
15.8 ERROR!
If 2AM-BBS encounters an error that it does not know how to deal with, it
will give the following message:
Error encountered... system shutdown initiated.
The system will be back up in 1 minute.
Disconnecting....
A message will also be written in the syslog. Check the files you have
created for the section where the error occurred. If you are positive
your files are in order, and if the error repeats itself, please get in
touch with 2AM Associates. We need the EXACT line from the syslog and as
much additional information as you can provide. We will either fix the
error or point out the error on your side. All fixes of this nature are
bug fixes and are free, so please do speak up if something strange crops
up.
15-2
2AM BBS
Sysop's Manual Main Menu Maintenance
_________________________________________________________________________
Main Menu Maintenance
Chapter 16
This allows you to manipulate files on the disk and requires user
privilege bit #66 to access. Type [MAINT] at the main menu prompt to
enter main menu maint. The menu is (menu disk:maint.mnu) and offers the
following commands:
1. [A]dd directory mimics the DOS mkdir command. You will be asked for
the name of the directory to add.
2. [C]opy file will ask for a file to copy from and a filename to copy
to. It works exactly as the DOS copy command with the exception that
it will NOT copy groups of files (ie. copy *.dat *.old).
3. [D]irectory will ask for a path, and output a directory in the form
that DOS 'dir /w' does. Two things here: put a '\' at the end of the
path name or directory will not work. Also, sub directories will not
appear.
4. [E]rase a file asks for a filename and then deletes that file. It
works exactly as the DOS erase or delete commands do, with the
exception that you cannot delete more than one file at a time (ie.
erase *.dat).
5. [F]orce login notes goes through the entire userlog and sets
everyone's forced login notes read flag to true. Every user will have
to read the login notes in their entirety once, after which theis
login flag will be turned off.
6. [R]emove directory will ask for a directory name and remove that
directory. It works exactly as the DOS rmdir command works.
7. [V]iew text file will ask for a text file name and then will output
that file.
8. [X]-fer files allows a remote user to send/receive a file. The user
is asked whether the file should be sent to the BBS or received, and
then for the filename (give full filename including drive letter and
path) on disk. Note: this option does not make an entry in the
FILES.LOG.
9. [S]top port (available only in multi-user mode) will notify and then
log out the user on the port specified.
16-1
2AM BBS
Sysop's Manual Miscellaneous Options
_________________________________________________________________________
Miscellaneous Options
Chapter 17
17.1 LOGGING IN FROM THE CONSOLE
If a user has privilege bit #72, he can access the bbs from the terminal
(local mode). This privilege bit prevents anyone from walking up to your
terminal and logging in. It is especially useful when the terminal is
easily accessed by many people that you don't want logging in locally.
To log on in local mode, hit the ESCAPE key.
17.2 TIMEOUTS
The system will not just sit forever waiting for a user to do something.
So that no one is able to log in and hold the system forever, all prompts
are set to timeout after a certain time. Timeouts run as follows:
1. A user has 5 minutes to get a valid username and password entered from
the "account number" prompt.
2. If the user is a new user, 35 minutes are allotted for filling out the
new user application.
3. Once the user is inside the board, a user's time limit is governed by
the time limit set in the user record. New users get 35 minutes
online by default. NOTE: This may be altered by creating or editing
the Newuser.dat file.
4. If a user is at one of the many single-character prompts, the user has
5 minutes to pick an option before a default option is picked for the
user. For example:
Leave feedback? (y,[N]) >
If a user times out, he will automatically default to the [N] option and
continues to the next prompt.
17.3 CARRIER DROPS
If the user drops carrier, the bbs will restart. Users lose two minutes
each time they drop carrier unless they have the two minute time penalty
disable (privilege bit number #73). If a user has call waiting, you may
want to give him or her this privilege bit.
17.4 THE SCHEDULER
The scheduler allows the sysop to run other programs at prescheduled
times. Such programs might be used to run utilities or place your board
offhook at certain times of the day. Scheduler data is stored in a the
file: sys_disk:schedulX.dat where X is the port number to be run. The
file is in the following format.
17-1
2AM BBS
Sysop's Manual Miscellaneous Options
_________________________________________________________________________
(| equals one space).
Hour (0 through 23) | minutes (0 through 59) | 0 or 1 | Command to pass
to DOS
The third field (0 or 1) is used to signal a priority shutdown. If this
is set to 1, the board will shut down at that time no matter what is
being done by the user. If it is set to 0, the user's time limit will be
truncated but they will not be forced offline at the exact time of the
scheduled shutdown. For instance, if a user is leaving feedback, he will
be allowed to finish it before the board takes itself offline.
Example:
4 30 0 /c C:\BBS\SCHEDULE\BACKUP.BAT
6 25 1 /c C:\BBS\UTIL\BSMAINT.EXE C:\BBS\BASES\ Y BASEINFO.ALT
At 4:30 AM, the board will shut down (non-priority) and execute the
BACKUP.BAT program. Note the extra space before the /c as well as the /c
itself. This is identical to the system used for jumpdoors.
At 6:25 AM, the board will shut down (priority) and compress the bases
listed in BASEINFO.ALT. The Y indicates that it will compress messages
outside the window limit (See utilities chapter for more info).
NOTE: All tasks are expected to be in order of execution. In other
words, a task to be executed at 3 AM should be before a task to be
executed at 4 AM. If a task runs over time into the next task, the
second task will not be executed. When the scheduler is active, the main
screen will notify you with the message "Shutdown time scheduled".
17.5 A NOTE ABOUT BACKUPS
Since it is likely that you will be producing backups via the scheduler,
this note is placed here. Many commercial back-up program have an
interesting quirk to them. If for some reason you have to restore your
system from a backup you made, they usually do not recreate "empty"
subdirectories. The sem_disk used by 2AM will normally be empty when
there are no users on line. If this directory does not exist, 2AM will
NOT run properly in multiuser mode. When restoring from any backup
program, make certain that ALL directories are in place since some many
not have had anything in them when the backup was made.
17-2
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
Utilities
Chapter 18
A utility is a stand-alone program that must be run from outside the BBS.
Each of the following utilities must be run from DOS. To run any of the
utilities, input the program name at the DOS prompt.
18.1 BASEEDIT.EXE
This program is designed to assist the 2AM sysop in creating his/her
message base "BASEINFO" file. It provides a simple to use editor that
will eliminate the possibility of confusing access bits while creating
the file. It also provides the option to view the baseinfo file as it
would be output by 2AM-BBS. This output can be the entire file or
limited to certain access bits to see exactly what user with a given
access bit would see.
Please note: Previous version of this program were called EZ-BI.
To run the program type:
BASEEDIT
It is strongly suggested that you take the BBS off-line when using BASE
EDIT.
The title screen appears. Press ENTER at this screen to continue.
BASE EDIT now asks for the path to the BASEINFO file. If you installed
2AM-BBS using the default directories, just press <Enter> here. If the
file is in another location, enter the directory. Be sure to include the
drive and the ending "\". If BASE EDIT does not find a file named
BASEINFO in the directory it will offer to create one.
Once the file is found, BASE EDIT loads it and enters the command mode.
This mode consists of a three part screen. Part 1 is the biggest
section. It occupies the top left half of the screen. In this location,
BASE EDIT will display the contents of the BASEINFO file along with line
numbers for your reference. Up and down arrows, Page Up and Page Down
keys scroll this display. HOME will take you to the first line. END
will take you to the last line. These are only for display purposes.
You do NOT have to be on a given line to enact a command on it.
Part 2 is in the upper right hand corner of the screen. This is the menu
of commands that you can call from the command mode.
Part 3 is the command window. It is the bottom of the screen. It is
here that you enter your commands and BASE EDIT tells you what is going
on.
18-1
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
Explanation of Command Mode Options:
------------------------------------
? - HELP: Summary of all the commands available from BASE EDIT.
A - Access.Dat: This option will allow you to edit the information in the
access.dat file for a privilege bit. This way when you assign a bit
to a base, you can edit the message for that bit from BASE EDIT.
D - Delete Line: This option will remove a line from the file. It will
also check to see if that base exists. If so, it will offer to delete
it for you. If you receive this prompt and answer YES then THAT BASE
WILL BE TOTALLY REMOVED FROM YOUR BBS! All messages on it will be
deleted.
E - Edit a line: BASE EDIT will display the old data for the line number
you provide and ask you for new inputs. A valid line number must be
given.
F - File and Exit: This command will first save you BASEINFO file and
exit the BASE EDIT program in a single step.
I - Insert line: This will add a line to the file. If the line number
you provide is within the file already, BASE EDIT will insert a new
line at that point and prompt you for the data input. If you provide
a line number of 0, BASE EDIT will append a new line to the end of the
file and ask for the appropriate data.
M - Move a line to another location: This command will allow you to move
one line to another location in the file. The syntax is: line-to-
move, where-to-move-it-to. This comes in handy for modifying an
existing BASEINFO file. Both the line numbers must be valid lines.
Q - Quit WITHOUT save: This option exits BASE EDIT. You will be asked
to verify it since the file you are working with is NOT saved
automatically.
S - Save: This option will save your file. The original file will have
its named changed to BASEINFO.OLD for backup purposes. NOTE: If you
save a work file more than once in a session, your original file is
lost! PLEASE make a back-up of your BASEINFO file before running this
program just to be on the safe side.
T - Toggle Display: This option changes the primary display mode. It
allows you to tell what lines in your baseinfo file are comments and
what type of bases they are in a single glance.
V - View: This option lets you view how the BASEINFO will appear through
2AM-BBS. There are two types of View commands. View ALL lists the
entire file regardless of access bits. This is helpful to get an
18-2
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
overall evaluation of your work. View Privilege will ask you for a
list of access bits. The BASEINFO file will then be listed as it
would appear to someone with those access bits, including read-only
and maintenance markers. If the View command takes up more than one
screen - BASE EDIT will pause after it draws the first screen. You
can then Scroll the file line by line using the UP and DOWN arrow
keys. In the View screen - Press 'Q' to return to the command mode.
The View Privilege screen does not take into account the TAG bits.
It only reflects the READ, WRITE and MAINT bit settings.
18.2 BSMAINT.EXE
This utility is used to compress message bases. This is a complete
compression as compared to the partial compression (pointer file
compression) that the BBS prompts you for when you delete messages. It
removes all deleted messages, and optionally removes messages outside
your base window limits.
BSMAINT may be run in two different ways. In the first method, you are
prompted for the location of BASE_DISK and whether or not you want to
delete messages that are outside any window limits you have set. The
second method involves using the command line, and was included so that
you could run this program via the scheduler (see scheduler in the
Miscellaneous chapter). Instead of typing BSMAINT at the DOS prompt,
additional information must be entered in the following format:
C> BSMAINT BASE_DISK YN ALTERNATE_BASEINFO
Where:
Base_disk is the name of the directory where your message bases
reside (same format as used in drive.dat)
YN is either a Y or an N--not both. Y signifies that BSMAINT should
delete all messages outside any set base windows.
Alternate_baseinfo is not required. If you leave this blank it will
assume that you want to compress ALL your bases. An alternate baseinfo
is a file which is of the same format as your baseinfo, but without some
of your bases. This is included basically to save time during the base
compression. You may have bases with no window assigments that are
thousands of messages long. If you don't want them to go through the
compression process, don't include them in your alternate baseinfo list.
It must be in BASE_DISK, and may be any name you desire.
Examples of the second method:
BSMAINT c:\bbs\bases\ Y baseinfo.alt
(total compression of bases listed in baseinfo.alt)
BSMAINT d:\bases\ N
(compress only delete messages in all bases)
18-3
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
18.3 DAYVIEW.EXE
DAYVIEW allows you to view a user's call-by-call statistics, and also
allows you to delete entries in your daily logs.
The first thing DAYVIEW will prompt you for is the location of LOG_DISK.
If you hit return it will assume that LOG_DISK is the installation
default of C:\BBS\LOG\. Next it will ask you for the date of the log to
display. After you choose a date, DAYVIEW shows you each log entry for
that day, one at a time. You have the option to go forward or backward
one user at a time, delete a specific entry, or quit the date. The
entries include the user's name, length of call, number of posts made,
number of e-mail messages sent, whether or not the user is new, baud
rate, port number, and uploads/downloads made. After reading all the
entries for a day, DAYVIEW will prompt you for another date to view.
Hitting return will abort the utility.
NOTE: NEVER delete entries in the current day's log when someone is
logged into the BBS! This includes jumping to DOS from the BBS. You
will cause errors to occur if you do this!
18.4 DBMAINT.EXE
This utility is used to compress the help and BBSlister files. It
removes deleted entries, and restructures these files to try to increase
their access speeds.
DBMAINT may be run in two different ways. The first method requires you
to run the program and supply the name of the files you wish compressed.
The second involves using the command line, and was included so that you
could run this program via the scheduler. (See scheduler in the
Miscellaneous chapter). Instead of typing DBMAINT at the DOS prompt,
additional information must be entered in the following format:
C> DBMAINT INFO_DISK\FILENAME
Where:
info_disk\filename is the name of the directory and the type of files
you will compress.
Examples
DBMAINT c:\bbs\bbslist\bbslist
(compression of BBSlister files)
DBMAINT c:\bbs\help\help
(compression of help files)
18-4
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
Note that the help files should only be compressed if you have been
adding and removing help topics via the HLPMAINT utility.
18.5 DIRSORT.EXE
DirSort sorts the DIRx.DAT files used in the files section of 2AM-BBS.
This sort is numeric by access bit then alphabetically by file name or
numeric by date. Comments will remain with the files they relate to.
To call DIRSORT from a DOS prompt, type:
DIRSORT
If you are running in more than one port on the BBS and it is possible
that one of the other ports is in use, type:
DIRSORT M
This will activate all the necessary record locking for a multiuser BBS.
The first screen appears and asks for the path name for the LIBRARY.DAT
file that 2AM-BBS uses. If you installed 2AM by using the installation
program that came with it and did not change any of the directories, just
hit return. To quit here, enter a Q. To specify any other directory,
type it here.
If you enabled the Multiuser mode a special screen will now appear here.
It will ask for the location of the SEM_DISK. You must enter the path
name, for example:
c:\bbs\sem\
You must include the ending "\". Dirsort can not check to make sure you
entered the correct path so please make sure you do it correctly!!
DirSort will then ask if you want to see all the file loads as they
occur. You can answer Yes if you need to view the files as they are
loaded so you can determine the way comments are contained in the file.
If you answer no - the file load will be faster.
The LIBRARY.DAT file will be displayed to you as the MAIN MENU. From
this menu you will be asked to select the DIRx file to be sorted.
Selecting a Q will quit this program. Selecting an A will cause DirSort
to sort ALL the DIR files using one set of sort parameters.
Once a directory is selected, DirSort will ask for the sort parameter.
It can sort by FILENAME or by DATE. Enter an F or D for your selection.
To obtain an alphabetical listing by date - enter option B. This will
sort the file first by Filename then Date.
18-5
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
Once the file has been loaded, DirSort will ask how comments are placed
in this file. The two choices are: [A]bove the file, or [B]elow the file
they refer to.
DirSort does two sorts. The first sort is a numeric sort by access bit
(1 first, 252 last). Once this is completed, DirSort then sorts by
filename (or date) within the access bit.
The original file is renamed to have a '.OLD' extension. DirSort also
creates a temporary file named TEMPSORT.OUT in the same directory as the
DIRx.DAT files. If a file already exists by that name, it is erased.
18.6 DRIVER.EXE
This utility allows you to change various system configurations that are
stored in the DRIVEx.DAT file. It is completely menu driven, and may
only be run from DOS.
DRIVER will prompt you for the path and name of your DRIVEx.DAT file. If
you hit return, it assumes that you mean DRIVE.DAT in the current
directory. In a single user version, the filename should be something
like c:\bbs\drive.dat. In the multiuser version, you must indicate which
drive.dat you wish to edit. Example, c:\bbs\drive1.dat.). NOTE:
Multiuser systems will have to run this program on each of the DRIVEx.DAT
files in order to effect all nodes.
If the file you supplied does not exist, it will question you as to
whether or not you wish to create a new file or quit.
After DRIVER has loaded or created the necessary information, it places
windows on the screen. To select an item the use arrow keys and hit
RETURN when the item you wish to change is in reverse mode.
18.7 HLPMAINT.EXE
HLPMAINT allows the sysop to add or remove help topics from the help
library. This is generally useful if you wish to remove help topics on
sections of the BBS that you do not plan to use, or if you want to add
help topics that are more specific to your bbs.
When you run HLPMAINT, it will prompt you to enter the current help
directory. Hitting return at this prompt will go to the system default
directory (c:\bbs\help.)
Next it will prompt you to Add or Remove help files. Enter either an A
or an R. Q will quit the utility. If you choose to add a help topic, it
will prompt you for three items: help topic name, privilege to read this
topic, and the name of the help file you will use. All help files must be
kept in HELP_DISK. If you remove a help file, it will prompt you for the
18-6
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
name of the topic to be removed. NOTE: When you remove a topic it does
NOT compress the help system files, or erase the help file used by that
name. To compress the help files, see DBMAINT.
18.8 LOOKER.EXE
LOOKER creates/recreates the lookup tables that are used by the BBS to
locate users by their names/handles. It can be run by typing LOOKER from
the DOS prompt.
Before running LOOKER, you must delete all files from the LOOK_DISK.
After you run LOOKER it will ask you for both the locations of SYS_DISK
and LOOK_DISK. After this information is supplied, LOOKER will proceed
to rebuild the tables based upon your userlog.
If you cannot send e-mail to a user, or cannot edit them by name, your
lookup tables may be damaged and you should run this program.
18.9 MAKEVOTE.EXE
MAKEVOTE is used to create a blank voter file. It should only be used if
VOTER.DAT does not exist, or if you wish to delete all your current
voting topics.
18-7
2AM BBS
Sysop's Manual Utilities
_________________________________________________________________________
Appendix 1-8
2AM BBS
Sysop's Manual Priv Bits
_________________________________________________________________________
Privilege Bits
Appendix 1
This section lists all the privalige bits used by 2AM-BBS. If any bits
are not listed here, they are free for you to assign as you see fit.
1.1 BY NUMBER
Bit Purpose
2 Use Email
7 Download at 300 Baud
8 Download at 1200/2400 Baud
9 Go over time limit on downloads
60 May skip messages in Email
61 MAINT commands for BBS Lister
62 MAINT commands for Email
63 File messages in Email ([D])
64 MAINT section for Files
65 Feedback Access
66 MAINT section for Main Menu
67 MAINT section for Trivia Master
68 MAINT commands for Voter
69 May add one BBS to BBS Lister
70 Permanent BBS Lister Access
71 Access Uploads in Files
72 Local Mode Access
73 Two Minute Time Penalty Disable
75 Special Login Message #1
76 Special Login Message #2
77 Refile User Application/Special Login Message #3
78 60 Line editor
79 100 Line editor
80 ANSI in editor
81 /LOAD in editor
82 /SVE in editor
83 May copy messages
85 May create bases
86 MAINT: Master bases
87 /NAME in editor
88 RESERVED for future expansion
89 Access Validator
90 May View user applications in validator
91 May View user passwords in validator
92 RESERVED for future validator use
93 May Edit users in validator
94 May Delete users in validator
95 Protect User from deletion
96-98 RESERVED for future expansion
99 System Access
100 MAINT: Jumpdoors
Appendix 1-1
2AM BBS
Sysop's Manual Priv Bits
_________________________________________________________________________
193 TRIVIA Section 1
194 TRIVIA Section 2
195 TRIVIA Section 3
... .....
211 TRIVIA Section 19
212 TRIVIA Section 20
213-255 "INVISIBLE" bits. Used for base selection by user.
1.2 BY USE
BBS Lister:
61 MAINT commands for BBS Lister
69 May add one BBS to BBS Lister
70 Permanent BBS Lister Access
Email:
2 Use Email
60 May skip messages in Email
62 MAINT commands in Email
63 File messages in Email during Read Incomming ([D])
Editor:
78 60 Line editor
79 100 Line editor
80 ANSI in editor
81 /LOAD in editor
82 /SVE in editor
87 /NAME in editor
Files:
7 Download at 300 Baud
8 Download at 1200/2400 Baud
9 Go over time limit on downloads
64 MAINT section for Files
71 Access Uploads in Files
Jumpdoors:
100 MAINT section for Jumpdoors
Message Bases:
83 May copy messages
85 May create bases
86 MAINT: Master bases
213-255 "INVISIBLE". May be used for base selection bits.
Appendix 1-2
2AM BBS
Sysop's Manual Priv Bits
_________________________________________________________________________
Maint:
61 MAINT commands in BBS Lister
62 MAINT commands in Email
64 MAINT section for Files
66 MAINT section for Main Menu
67 MAINT section for Trivia Master
68 MAINT commands in Voter
86 MAINT section for Master bases
100 MAINT section for Jumpdoors
Trivia:
67 MAINT: Trivia Master
193 TRIVIA Section 1
194 TRIVIA Section 2
195 TRIVIA Section 3
... .....
211 TRIVIA Section 19
212 TRIVIA Section 20
Validator:
89 Access Validator
90 May View user applications in validator
91 May View user passwords in validator
92 RESERVED for future validator use
93 May Edit users in validator
94 May Delete users in validator
Voter:
68 MAINT section for Voter
Miscel.
65 Feedback Access
66 MAINT section for Main Menu
72 Local Mode Access
73 Two Minute Time Penalty Disable
75 Special Login Message #1
76 Special Login Message #2
77 Refile User Application/Special Login Message #3
95 Protect User from Deletion
99 System Access
Reserved:
88 RESERVED for future expansion
92 RESERVED for future validator use
96-98 RESERVED for future expansion
Appendix 1-3
2AM BBS
Sysop's Manual 2AM File Map
_________________________________________________________________________
2AM File Map
Appendix 2
Key
+ = text files
$ = sysop created files
% = supplied with system
X, XX, YY = number
Base_disk
$% baseXX.dat Data file for message base
$% baseXX.ptr Pointer file for message base
+$% baseinfo. Master Base file
% newmsg.dat New Message counter. Do NOT tamper with
this.
+$ [alternate baseinfo] Optional baseinfo for BSMAINT
BBS_disk
bbslist.dat BBSlist data file
bbslist.ptr BBSlist pointer file
bbslist.sr1 BBSlist sort file
Chat_disk
+ % chat.2nd Chat message for second request
+ % chat.abt Chat message for aborting
+ % chat.acc Chat message for accepting
+ % chat.den Chat message for timeout
+ % chat.dni Chat message for denial
+ % chat.ext Chat message for exit
+ % chat.req Chat message for initial request
Dload_disk
+ % dirX.dat Section library
+$% library.dat Master files library
+$ protocol.dat Download external protocol list
Help_disk
+ % *.hlp Text for help system
% help.dat Data file for help system
% help.ptr Pointer file for help system
% help.sr1 Sort file for help system
Appendix 2-1
2AM BBS
Sysop's Manual 2AM File Map
_________________________________________________________________________
Jump_disk
+ jumperX.dat User information for jumpdoor
+$ passages.dat Jumpdoor directory
Log_disk
XX-XX-XX.log Daily log for date XX-XX-XX
Look_disk
% lookXX User lookup tables
Mail_disk
minXX.dat Incoming mail data
minXX.ptr Incoming mail pointer
moutXX. Outgoing mail flag file
Menu_disk
+ % base[80x].mnu Message base menu
+ % bbsls[80x].mnu BBSList menu
+ % bmain[80x].mnu Base Maint menu
+ % conf[80x].mnu Configure menu
+ % door[80x].mnu Jumpdoors menu
+ % edcom[80x].mnu Editor menu
+ % email[80x].mnu Email menu
+ % files[80x].mnu Files menu
+ % main[80x].mnu Main menu
+ % maint[80x].mnu Main menu Maint menu
+ % triv[80x].mnu Trivia menu
+ % valid[80x].mnu Validator menu
+ % voter[80x].mnu Voter menu
Sem_disk
+ *.sem Temporary sem file (multiuser only)
+ mboxX. Temporary mailbox file (multiuser only)
us#XX. User lock, flags user online
(erase files if present & no one logged in)
Appendix 2-2
2AM BBS
Sysop's Manual 2AM File Map
_________________________________________________________________________
Sys_disk
+$ *.def Validator definition files
+ % *.log System logs for validator
+$ *.swe Sweeper output files
% bbs.* 2AM-BBS executable program
+$% drive[x].dat System configuration file
% last Special format last caller file
+$ newuser.dat New user configuration file
+$ pon.cnf Existance causes logging to printer
+$ rejects.dat Handles not allowed on system
+$ schedul[x].dat Scheduler time schedule
% userapp.dat User Application file, contains
personal info
% userlog.dat Userlog, contains all account
information
Text_disk
+ % append.txt Application closing comments
+ % appq1.txt Applications questions file 1
+ % appq2.txt " " 2
+ % appq3.txt " " 3
+ % notes[80x].txt Login notes
+ % nuser.txt New user notes
+ % offnotes.txt Logout notes
+ % privacy.txt User information policy
+ % splogin1.txt Special Login message 1
+ % splogin2.txt " " 2
+ % splogin3.txt " " 3, refile
application
+ % start.txt System introduction message
+ % sysin[80x].txt System information
+ uplod[80x].txt Notice for uploads
+ % userapp.txt Userapplication introduction
Trivia_disk
+ tansX.dat Trivia last Q&A file
trivaX.dat Trivia answers
+$% trivia.lvl Master trivia directory
+ % trivqX.dat Trivia questions
tscorcX.dat Trivia current scores
tscorlX.dat Trivia last scores
Appendix 2-3
2AM BBS
Sysop's Manual 2AM File Map
_________________________________________________________________________
Uload_disk
+ lastu.dat Last upload number
+$ protocol.dat Upload external protocol list
up-XX.YY Uploaded programs
Vote_disk
$ voter.dat Voter data file
Appendix 2-4
2AM BBS
Sysop's Manual Multiuser Setup and Commands
_________________________________________________________________________
Multiuser Setup and Commands
Appendix 3
3.1 CHANGES TO DRIVE.DAT
When using the multiuser configuration, the name of DRIVE.DAT changes to
either DRIVE1.DAT or DRIVE2.DAT depending on the port you are using. You
are responsible for creating these files. NOTE: Make sure that you set
the value for the COM port to two different values in these files.
3.2 CHANGES TO BBS PARAMETERS
The first parameter when running the bbs is now controlling the port
number of the bbs that will run.
Example:
C> BBS 1
Will execute the BBS, using DRIVE1.DAT, and run port 1.
The second parameter controls whether or not the bell can be heard.
Example:
C> BBS 0 1
Will run the BBS in single user mode with the bells off.
Never pass more than two parameters to the BBS. The third parameter is
reserved for the system. Do NOT use it.
3.3 SEM DISK AND EXECUTION
Always erase any files from sem disk before running the BBS. NOTE: Be
sure that none of these files are in use by the other port if a user is
online. Each file contains the port number of who is using it.
Never run only one line in the multiuser setting unless the other line
has executed at least once. There are memory locks, and each port is
responsible for clearing those locks when it starts up. If you run one
line, the system may end up waiting for the other line to unlock that
memory. There is a single user mode, use it if you are running one line.
3.4 ADDITIONAL COMMANDS IN MULTIUSER MODE
The WHO command is available from the main menu ([W]) when in multiuser
mode. This will display the other users and what they are doing.
In main menu MAINT there is a command [S] that can be used to STOP the
other line. This will toss the user on the other line off the board at
Appendix 3-1
2AM BBS
Sysop's Manual Multiuser Setup and Commands
_________________________________________________________________________
the first chance it gets. As a safety feature of this option, you must
supply the port number with the S command.
Example:
MAINT > S2
Will through the user off port two.
3.5 EMAIL NOTIFICATION
If a user is online when mail is sent to them, they will receive a
message to inform them that they have new mail from user ABCD, where ABCD
is the user who sent the mail.
Appendix 3-2
2AM BBS
Sysop's Manual Bit Encoded Responses
_________________________________________________________________________
Bit Encoded Responses
Appendix 4
This chapter will cover the bit encoding method used for the three
optional questions asked a user during his/her application.
When you make up a question for the user application, you can have up to
8 possible answers for that question.
A user can potentially select more than one answer from the list. Now, a
user could select just one choice (example, choice 8), or a user could
select many choices (say, 1,3,4). The bit-encoded method allows you to
store all the choices in one integer (actually a byte).
Each user application has room for 3 bit encoded response questions. Ask
these questions by creating the files text disk:appq1.txt,
text disk:appq2.txt, and text disk:appq3.txt respectively. If any of
these files do not exist, the question corresponding to that file will be
skipped, and the user response for that question will be 0.
The following table describes how to convert the data (stored in encoded
form) back to the responses the user gave.
Appendix 4-1
2AM BBS
Sysop's Manual Bit Encoded Responses
_________________________________________________________________________
----------------------------------------------------------
code choices code choices code choices
----------------------------------------------------------
0 none 43 1 2 4 6 86 2 3 5 7
1 1 44 3 4 6 87 1 2 3 5 7
2 2 45 1 3 4 6 88 4 5 7
3 1 2 46 2 3 4 6 89 1 4 5 7
4 3 47 1 2 3 4 6 90 2 4 5 7
5 1 3 48 5 6 91 1 2 4 5 7
6 2 3 49 1 5 6 92 3 4 5 7
7 1 2 3 50 2 5 6 93 1 3 4 5 7
8 4 51 1 2 5 6 94 2 3 4 5 7
9 1 4 52 3 5 6 95 1 2 3 4 5 7
10 2 4 53 1 3 5 6 96 6 7
11 1 2 4 54 2 3 5 6 97 1 6 7
12 3 4 55 1 2 3 5 6 98 2 6 7
13 1 3 4 56 4 5 6 99 1 2 6 7
14 2 3 4 57 1 4 5 6 100 3 6 7
15 1 2 3 4 58 2 4 5 6 101 1 3 6 7
16 5 59 1 2 4 5 6 102 2 3 6 7
17 1 5 60 3 4 5 6 103 1 2 3 6 7
18 2 5 61 1 3 4 5 6 104 4 6 7
19 1 2 5 62 2 3 4 5 6 105 1 4 6 7
20 3 5 63 1 2 3 4 5 6 106 2 4 6 7
21 1 3 5 64 7 107 1 2 4 6 7
22 2 3 5 65 1 7 108 3 4 6 7
23 1 2 3 5 66 2 7 109 1 3 4 6 7
24 4 5 67 1 2 7 110 2 3 4 6 7
25 1 4 5 68 3 7 111 1 2 3 4 6 7
26 2 4 5 69 1 3 7 112 5 6 7
27 1 2 4 5 70 2 3 7 113 1 5 6 7
28 3 4 5 71 1 2 3 7 114 2 5 6 7
29 1 3 4 5 72 4 7 115 1 2 5 6 7
30 2 3 4 5 73 1 4 7 116 3 5 6 7
31 1 2 3 4 5 74 2 4 7 117 1 3 5 6 7
32 6 75 1 2 4 7 118 2 3 5 6 7
33 1 6 76 3 4 7 119 1 2 3 5 6 7
34 2 6 77 1 3 4 7 120 4 5 6 7
35 1 2 6 78 2 3 4 7 121 1 4 5 6 7
36 3 6 79 1 2 3 4 7 122 2 4 5 6 7
37 1 3 6 80 5 7 123 1 2 4 5 6 7
38 2 3 6 81 1 5 7 124 3 4 5 6 7
39 1 2 3 6 82 2 5 7 125 1 3 4 5 6 7
40 4 6 83 1 2 5 7 126 2 3 4 5 6 7
41 1 4 6 84 3 5 7 127 1 2 3 4 5 6 7
42 2 4 6 85 1 3 5 7 128 8
If the code is over 128, subtract 128 from the code and look up the
result. The choices will be 8 (from the 128 subtracted off) plus the
choices you just looked up.
Appendix 4-2
2AM BBS
Sysop's Manual DRIVE.DAT
_________________________________________________________________________
The Drive.Dat File
Appendix 5
Here is a list of all the items in sys disk:driveX.dat. Each item should
be on a separate line.
5.1 SYSTEM SPECIFICS [Lines 1-5]
1. System Name (up to 80 characters)
2. Maximum Baudrate system can handle (300, 1200, 2400 - one number)
3. Upload/download ratio file credits on a per K basis.
4. Opening time for the Files section
5 Closing time for the files section. If this line is identical to line
4, the Files section is open 24 hours a day.
5.2 DRIVE PATHS [6-21]
6. sys_disk
7. base_disk
8. help_disk
9. mail_disk
10. trivia_disk
11. dload_disk
12. bbs_disk
13. log_disk
14. menu_disk
15. text_disk
16. vote_disk
17. uload_disk
18. chat_disk
19. sem_disk
20. look_disk
21. jump_disk
5.3 PROMPTS [22 - 34]
When installation is done, default prompts are written in. Any may be
changed by editing this file.
22. Prompt extension (EX: '>')
23. Prompt for BBSLister
24. Prompt for Email
25. Prompt for FILES
26. Prompt for Help
27. Prompt for Config
28. Prompt for Main
29. Prompt for Maintenance (from Main Menu)
Appendix 5-1
2AM BBS
Sysop's Manual DRIVE.DAT
_________________________________________________________________________
30. Prompt for Message Bases
31. Prompt for Trivia
32. Prompt for Validator
33. Prompt for Voter
34. Prompt for JumpDoors
5.4 HEADERS AND MESSAGES [35 - 45]
Various section headers and messages are on these lines. If you do not
like a phrase that the board outputs somewhere, go to this file and see
if you can find that phrase. If you can, edit this file and change the
phrase. Not all phrases are here; just the ones that got changed most
from our experiences. If you find a phrase that you don't like, contact
us and in a future version, we may make it a line here. NOTE: 2AM
Associates will resist changing error or informational messages to avoid
ambiguity in user or sysop documentation.
5.5 MODEM AND PORT INFORMATION [lines 46 - 51]
46. DOS COM port for this line. (0 = Local mode only, 1=COM1, 2=COM2)
47. Initialization string for the modem.
ATE0M0V1X1F1S2=128S7=10S10=20S0=1
Please note that this is ALL UPPER CASE. Owners may wish to set X0
for 300 only, X1 for 1200 baud and X4 for 2400 baud modems.
48. Pause between characters during initalization. 50 seems to work
fine. You may wish to increase it if the modem does not respond
correctly.
49. Pause between initization commands. We use 250, but if the modem
does not respond correctly, increase it.
50. Priv needed to log into this port. Can be 0, which allows everyone.
51. The name of this port of the BBS. (blank line on a single user
system)
Appendix 5-2
2AM BBS
Sysop's Manual ANSI Codes
_________________________________________________________________________
Appendix 6
ANSI Color Commands
2AM-BBS supports ANSI color in many places. Prompts, text file, menus,
email messages and message base posts may all contain ANSI color
commands. Below is a list of color commands recognized as standard
ANSI commands. All ANSI color commands begin with a ESCAPE
character, a "[" and end with a LOWER CASE "m".
( ^ = ESCAPE character)
Code Meaning
^[0m Reset Attributes. Return to normal colors.
^[1m Foreground color will be bold until reset.
^[5m Foreground color will blink until reset.
^[30m Black Foreground
^[31m Red Foreground
^[32m Green Foreground
^[33m Yellow Foreground
^[34m Blue Foreground
^[35m Magenta Foreground
^[36m Cyan Foreground
^[37m White Foreground
^[40m Black Background
^[41m Red Background
^[42m Green Background
^[43m Yellow Background
^[44m Blue Background
^[45m Magenta Background
^[46m Cyan Background
^[47m White Background
Notes:
1) Yellow will appear to be BROWN unless BOLD is on.
2) Due to limitations of Turbo Pascal, some colors may not appear to be
correct on the local terminal (SYSOP'S screen). Be assured that they
appear correct to the user.
3) It may be helpful to point out that Background colors are the same as
foreground colors plus 10.
4) ^[0m and ^[m are identical to each other. (The 0 is optional).
5) Commands may be nested with semi-colons (;). For example:
^[33;1;44m
will turn on yellow foreground, make it bold and make the background
blue.
Appendix 6-1
2AM BBS
Sysop's Manual Trouble Shooting
_________________________________________________________________________
Appendix 7
Trouble Shooting
If you have a problem with 2AM-BBS, please read through this appendix.
It contains several of the more common problems we receive from other
sysops.
Problem:
The "Waiting for Connect" message does not come up when I start my
BBS.
Solution:
There are a few problems that could cause this. They are all related
to your modem.
1. If you are using an external modem, make sure it is turned on and
plugged in.
2. Check DRIVEx.DAT and make sure that you have it configured for the
correct COM port (1 or 2), and the correct baud rate (300, 1200, or
2400).
3. Make sure that your modem supports all the commands in your
initialization string.
4. Adjust the Modem EOLN Pause and Modem Init Nulls in DRIVEx.DAT to a
number about 20-40 higher. This slows down the initialization
string. Restart the board, and see if this works.
5. If all else fails test it with a terminal program and see if modem
works.
Problem:
My modem does not detect a carrier drop.
Solution:
Some modems require an extra command in the modem initialization
string, or a specific dip switch setting. Consult your modem manual
and alter the initialization string in DRIVEx.DAT accordingly. (You
will want the CD line to follow the line, and not always be "high".)
Problem:
My modem does not hangup on people when they log out.
Solution:
Some modems require an extra command in the modem initialization
string, or a specific dip switch setting. Consult your modem manual
and alter the initialization string in DRIVEx.DAT accordingly. (You
will want the DTR line to follow the line, and not always be "high".)
Appendix 7-1
2AM BBS
Sysop's Manual Trouble Shooting
_________________________________________________________________________
Problem:
I get an ERROR 16 "Owner Generated Error in File Format".
Solution:
Check the data files in the section in which this occurred. Generally
this will happen if there is blank line at the end of one of the data
files, or a line in the file that does not follow the format we
describe in this manual. If you recently changed any system files,
you should go back and look at them.
Problem:
The system crashes everytime I try to log into the BBS in multiuser
mode.
Solution:
Check that SEM_DISK exists.
Problem:
My userlog is a 2 meg file!
Solution:
This shouldn't happen unless you are using a multitasker and a program
that does direct disk writing, or you are using a version of DOS older
than version 2.1. Being that not everyone is so careful to watch these
things, we have a utility that will help you restore the file to its
former glory, or as close to it as possible. It will be made available
on request.
Problem:
My message counters are all wrong.
Solution:
This can happen when you delete the file NEWMSG.DAT in BASE_DISK. It
will attempt to fix itself, by resetting itself to the next callers new
post number. If this happens to be a new user or someone who hasn't
called in a while, you might want to delete the file again and post a
message from your account.
Problem:
There is a username in the [U]serlog list that I cannot send mail to or
edit by name in the validator.
Appendix 7-2
2AM BBS
Sysop's Manual Trouble Shooting
_________________________________________________________________________
Solution:
You should erase the files in LOOK_DISK and run the utility LOOKER.
This happens when you either delete a file in LOOK_DISK or change
someones handle and answer no to the "Change Lookup Tables?" question
in the validator.
Problem:
My users complain that they are recieving "garbage" characters on their
screen.
Solution:
1. They are not calling at 8-N-1.
2. They are calling at the wrong baud rate.
3. Their terminal is configured for a graphics mode they don't support.
4. They are getting "Line Noise". If this happens to most/all of your
users, you might want to have your phone line checked. This is not
a software problem.
Problem:
I get DOS ERROR 8 whenever I try to Jump to Dos, Use a Jumpdoor, Use
the Scheduler, or Use an External Protocol.
Solution:
You are out of memory. Either remove some memory resident programs or
add more memory to your computer.
Problem:
The BBS is in multiuser mode and and appears to be frozen, but it
checks the disk every now and then.
Solution:
From the other port, erase all .sem files from SEM_DISK.
Problem:
I am in multiuser mode, and the output on my screen seems jerky.
Solution:
This is a side effect of multitasking. The user shouldn't see any
pauses in the output, but you will. The faster your computer is, the
less likely this is to be noticed.
Appendix 7-3
2AM BBS
Sysop's Manual Index
_________________________________________________________________________
Index
A
Access................................................................4-3
Access List...........................................................7-6
ACCESS.DAT......................................................4-1, 18-2
Account 0.............................................................4-2
ANSI...............................................11-2, 15-1, Appendix 6
ANSI Menus............................................................3-1
ASCII.................................................................7-2
250.................................................................3-2
B
BASEEDIT.EXE.........................................................18-1
BaseInfo..............................................................7-1
Bit Encoding.....................................................4-2, 5-1
Board Id........................................................5-1, 15-1
BSMAINT.EXE..........................................................18-3
C
Caller Number.........................................................4-2
Carrier Drop.........................................................17-1
Carrier Drops........................................................17-1
Chat.................................................................13-1
Files..............................................................14-1
Chat Bell............................................................14-1
Compaction
In BBSLister.......................................................18-4
In Help Files......................................................18-4
In Message Bases....................................................7-6
D
Daily Time Limit......................................................5-2
DAYVIEW.EXE..........................................................18-4
DBMAINT.EXE..........................................................18-4
DEF Files........................................................4-4, 5-3
Definition File.........................................................2
DIRSORT.EXE..........................................................18-5
DOS
Copy...............................................................16-1
Delete.............................................................16-1
Dir................................................................16-1
Erase..............................................................16-1
MkDir..............................................................16-1
RmDir..............................................................16-1
Drive.Dat.................................9-1, Appendix 3-1, Appendix 5-1
Index-1
2AM BBS
Sysop's Manual Index
_________________________________________________________________________
DRIVER.EXE...........................................................18-6
E
Editor Commands
/LOAD...............................................................6-1
/NAME...............................................................6-1
/SVE................................................................6-1
Email.................................................................7-1
Message Counter.....................................................4-2
Email Limit...........................................................4-6
Error................................................................15-2
ESCAPE key................................................2-1, 14-1, 17-1
F
Feedback........................................................7-3, 15-1
File Map.....................................................Appendix 2-1
Files
BaseInfo............................................................7-1
BBSLIST.DAT........................................................10-1
BBSLIST.PTR........................................................10-1
BBSLIST.SR1........................................................10-1
DirX.dat............................................................9-2
Drive.dat...............................9-1, Appendix 3-1, Appendix 5-1
In Chat............................................................14-1
In Files............................................................9-1
In Message Bases....................................................7-1
In Validator........................................................4-1
Jumper.dat.........................................................11-1
Lastu.dat...........................................................9-3
Library.dat.........................................................9-1
Main80.mnu..........................................................3-1
Main80x.mnu.........................................................3-1
Menus...............................................................3-1
NEWUSER.DAT...................................................5-3, 17-1
Passages.dat.......................................................11-1
Pon.cnf.............................................................2-1
Protocol.dat........................................................9-3
Up-XX.YY............................................................9-3
uplod.txt...........................................................9-3
x.DEF...............................................................5-3
Files Section.........................................................8-1
Rejects.dat...........................................................5-4
H
HLPMAINT.EXE.........................................................18-6
L
Index-2
2AM BBS
Sysop's Manual Index
_________________________________________________________________________
Local Mode...........................................................17-1
Log Fails.............................................................4-2
Logical Base..........................................................7-1
Login Messages........................................................5-4
LOOKER.EXE...........................................................18-7
M
Main Menu Maint......................................................15-1
Maint...........................................................7-5, 15-1
In BBS Lister......................................................10-1
In Files Section....................................................9-4
In Message Bases....................................................7-2
In Trivia..........................................................12-2
In Voter...........................................................13-1
MAKEVOTE.EXE.........................................................18-7
Menu Files............................................................3-1
Modem........................................................Appendix 5-2
Multiuser....................................................Appendix 3-1
N
NEWUSER.DAT................................................4-3, 5-3, 17-1
P
Password..............................................................4-2
Pattern matching......................................................4-5
Physical Base.........................................................7-1
Priv Bits
Changing............................................................4-4
Description.........................................................4-1
For Local Login...............................................2-1, 17-1
In BBS Lister......................................................10-1
In Editor...........................................................6-1
In Files Section....................................................9-5
In Message Bases....................................................7-6
In Trivia..........................................................12-3
In Validator........................................................4-8
In Voter...........................................................13-1
List................................................................4-3
User Applix........................................................15-2
Privacy Mode..........................................................7-2
R
Ranges................................................................4-4
Rejects.dat...........................................................5-4
S
Index-3
2AM BBS
Sysop's Manual Index
_________________________________________________________________________
Scheduler................................................17-1, 18-3, 18-4
Sweeper...............................................................4-5
SYS.LOG...............................................................4-4
Syslog..........................................................4-2, 15-2
T
Text Files............................................................3-2
Time Penalties.......................................................17-1
Timeout..............................................................17-1
Timeouts.............................................................17-1
Trivia...............................................................12-1
Trouble Shooting.............................................Appendix 7-1
U
User App..............................................................4-2
Userlog...............................................................4-1
Utilities
Utilities............................................................17-1
BSMAINT.............................................................7-2
DAYVIEW............................................................15-2
Driver..............................................................9-1
V
Validator.............................................................3-1
Files...............................................................4-1
Voter................................................................13-1
Index-4