home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Tools & Utilities
/
Collection of Tools and Utilities.iso
/
bbsutil
/
ava.zip
/
AVA.DOC
< prev
next >
Wrap
Text File
|
1989-05-01
|
14KB
|
397 lines
Automated Verification Algorithm
A true callback verification door for QBBS
(c) 1989 by Cat Miller
This program is supported by:
Cat Miller
Off-The-Wall Programming
13610 N. Scottsdale RD. STE 146
Scottsdale, Arizona 85254
A.V.A. which is an acronym for Automated Verification Algorithm is
a SysOp utility which will call back and automatically verify a bbs
user.
The following files were included in the .ZIP archive:
AVA.Exe..............................The Main Program
AVA.Doc..............................This documention text file
AVA.Cfg..............................A sample configuration file
To run A.V.A. you must use a TYPE 15 menu command and set an errorlevel.
Please refer to your QBBS documentation regarding menu setup. The
main program, the configuration file and Instruct.Txt must all be in
the same directory. It is prefered that you place AVA.Exe and
accompanying files in your QBBS root directory. This is because
A.V.A. utilizes PhoneDupe.Log and Phonenum.Ctl. Please refer to the
QBBS documentation regarding these two files QBBS. However, if you do
place AVA in its own directory then you must ensure that EXITINFO.BBS,
DORINFO1.DEF, PhoneDupe.Log and Phonenum.Ctl are copied into that
directory. You must also copy those files back into the QBBS main
directory before loading QuickBBS. QuickBBS uses the information
stored in EXITINFO.BBS to reinstate itself.
Batch File
----------
To add AVA to your QBBS batch file you must set an ErrorLevel with
your TYPE 15 menu option. Here is an example of a batch file:
Echo Off
Cls
Echo ***** Loading QBBS Now *****
:Start
QuickBBS
:After_Quick
If ErrorLevel 10 Goto AVA
If ErrorLevel 2 Goto RightHere
If ErrorLevel 1 Goto Somewhere
If ErrorLevel 0 Goto Quote
:AVA
AVA AVA.Cfg
Goto Restart
:RightHere
REM Doing something here
:Somewhere
REM Do something else here
:Quote
Ezquoted Quote.Cfg
Copy GoodBye.Asc+HitEnter.Asc
Copy GoodBye.Asc F:
Goto Start
:Restart
QuickBBS -r
Goto After_Quick
The above is a crude example. But you see that on an ErrorLevel 10
the batch file jumps to the label AVA and runs A.V.A. When A.V.A. is
completed the batch file jumps to the label Restart to reinstate the
bbs.
The following example shows what to expect if you place A.V.A. in its
own directory.
:AVA
cd c:\qbbs\Ava
Copy c:\qbbs\exitinfo.BBS
Copy c:\qbbs\dorinfo1.def
Copy c:\qbbs\phone*.*
AVA AVA.CFG
cd c:\qbbs
copy c:\qbbs\ava\exitinfo.bbs
copy c:\qbbs\ava\phone*.*
goto Restart
Whew! What a pain and it would cause somewhat of a lull if set up
this way. But, this is just an example.
A.V.A. Configuration file
-------------------------
A.V.A. requires a configuration file. The configuration file contains
information that A.V.A. will use during the course of verifying a
user. The syntax to invoke A.V.A. is as follows:
d:\> AVA AVA.Cfg
The configuration file consists of 13 lines and can be created with
your favorite word processor. Here is an explanation for each line.
Line 1:
Place the name of your BBS here.
Line 2:
This line tells A.V.A. whether or not to allow long distance or toll
calling.
Place a no here if you do not wish to run up your phone bill or place
a yes here to support this option.
Line 3:
Place a no here if you do not wish to grant minimum access or yes if
you do.
* Note *
If Line 2 is set to no then A.V.A. will look at line 3 and
act accordinly.
Line 4:
This line contains the security level granted to callers who
completed verification.
Line 5:
This line contains the download bytes granted after verification
has been completed.
* Note *
The download byte should match what you have defined in your
Limits.Ctl file.
Line 6:
This line contains the time limit granted after verification has
been completed.
* Note *
The time lime should match what you have defined in your
Limits.Ctl file.
Line 7:
This is the minimum security level granted to long distance or toll
callers.
This feature is active only if Line 3 is yes. However, it must still
be defined even if you do not support minimum access. A numeric value
is expected here.
Line 8:
This is the minimum download byte granted to long distance or toll
callers.
This feature is active only if Line 3 is yes. However, it must still
be defined even if you do not support minimum access. A numeric value
is expected here.
* Note *
The download byte should match what you have defined in your
Limits.Ctl file.
Line 9:
This is the minimum daily time limit granted to long distance or toll
callers.
This feature is active only if Line 3 is yes. However, it still must
be defined even if you do not support minimum access. The daily time
limit is expressed in minutes.
* Note *
The time limit should match what you have defined in your
Limits.Ctl file.
Line 10:
Place your area code here
Line 11:
If you want to allow callers to edit their phone numbers before
verification can begin then put a yes here.
Place a no here if you do not want to support this option.
Line 12:
Place a yes here to allow duplicate phone numbers or no to not allow
duplicate phone numbers.
Line 13:
Place the SysOp's security level here. This is so the SysOp will be
able to access A.V.A. for whatever reason.
Sample configuration file:
The Alternate Choice <--- BBS Name
no <--- Long distance or toll calls not allowed
yes <--- Grant minimum access to ld callers
20 <--- Verified security level
720 <--- Verified download bytes
45 <--- Verified time limit per day
10 <--- Minimum access level
320 <--- Minimum access download bytes
35 <--- Minimum access time limit per day
602 <--- My area code
no <--- Editing/changing numbers not allowed
no <--- Duplicate phone numbers are not allowed
100 <--- SysOp's security level
* I must state here that the configuration file consists of thirteen
lines. A.V.A. expects to find data in every line. *
What you the SysOp can expect from A.V.A.
-----------------------------------------
When a new caller uses AVA he will be presented with a screen of
information. This information explains what he can expect from AVA
and what AVA expects from him. His option here is to proceed with the
verification or return to the BBS.
The options available to the SysOp are:
[F6] Twit <--- Disconnect the caller completely
[F7] DOS <--- Shell to DOS
[F8] Return caller to bbs <--- Take caller out of the door
[F9] Display On/Off <--- Active only while the door is running
[F10] Chat <--- SysOp chat with caller
AVA retrieves the phone number(s) and caller's password from
EXITINFO.BBS. If you have elected to as