home *** CD-ROM | disk | FTP | other *** search
- ───────────────────────────────────────────────────────────────────────────
- 1AD, a little weapon that for the masses that they might pick it up and use
- it against the government. Call it a stick, call it a stone, whatever you
- call it, it is a line of defense against a dictatorship that says we have to
- do something their way, and not only that, we have to pay for it, be little
- as it may.
-
-
-
- This file was written 15 october 1994. It is quickly placed into the public
- domain by its author Michael Deweese (Zu Digital).
-
- This program is designed to stop certain types of messages or 'pings' from
- comming into your system, and it sends a response message to the originating
- system who sent it to you. This is all set up by you and it is possible that
- things can go crazy. I take no responsibility in this, and supply the full
- source code to you to ensure the fitness and proper running of the program.
- This program is not designed in anyway to cause network interference or
- 'bog' down the net. It was designed soley for the use of sending
- information to someone who sends you a ping that it isn't welcome at your
- BBS, and not for any other reason.
-
- Again, this file is public domain so there is no restrictions on this
- program to include using the code here in your own program, enhancing this
- program, or deleting and forgetting this program. (In other words, this
- program is just as much yours as it is anyones).
-
-
- Special thanks goes to Mr. Rick (WWIVNet @2109) for his work on TRON.EXE
- which he released over the net around Aug 11, 1994, of which, this program
- would probably not exist. Thanks go to the unselfish work of Mr. Rick and
- other great authors.
-
-
-
-
- ==============================================================================
-
-
- Setting up the program.
-
- To use this program as it is designed, you need to place this compiled
- program (1AD.EXE) in your BBS directory.
-
- You then add the line 1AD to a file in your net directory called
- EPREPROC.NET. This file may not exist if you don't have any other net
- pre-proccessors installed, so just create it with a simple text editor and
- add a single line with 1AD on it.
-
-
- Now you need to setup your INI file to let the program know what subtypes to
- process along with a couple of other things.
-
-
- You can follow along with the supplied sample 1AD.INI file that is included.
-
-
-
-
-
- -----------------------------------------------------------------------------
-
- Area [Main]
-
- The main area contains two identifiers, they are 'Text file directory' and
- 'Logfile'.
-
- Text file directory = nnnn
- Where nnnn is a full directory path to where the text files that make
- up your email that is being sent back to pingers exist. This directory
- defaults to .\ which is the current directory which it is in. I
- suggest you make a special directory for all your text files and point
- it to it.
-
- Logfile = nnnn
- Where nnnn is a full pathname to a logfile that will be kept up with
- every time the program is run. This file has to exist, and if you
- leave it null, the program will not run.
-
- From = nnnn
- Where nnnn is what will be used in the from line for all text messages
- which go out as email. You can put this as anything from 'A closed
- System' to your full alias (or name) and node number, like stock wwiv
- does.
-
- Title = nnnn
- Where nnnn is the title of any emails leaving your system. This is
- just like the From =, but for the title.
-
-
-
- -----------------------------------------------------------------------------
-
- Area [Pings]
-
- A single identifer exists here, but it can be repeated as many times as
- needed, it is the unwanted identifer, and goes something like.
-
- unwanted = major/minor/textfile
- Where main is the main type that you don't want. Minor is the minor
- type you don't want, minor type can be any valid minor number, or
- 'ALL' (must the single quotes of course) to include all minor types
- for that major type textfile is the textfile that will be emailed in
- response to the unwanted major/minor type.
-
- A simple rule is that the major/minor/textfile must be seperated with a '/'
- and it helps if the textfile exists.
-
-
-
-
- -----------------------------------------------------------------------------
-
-
- Area [Ok systems]
-
- A single identifer exists here, but it too may be repeated as many times as
- needed, it is to determin what systems will be allowed to pass the pings
- through your system. It goes something like...
-
- wanted = nnnn
- Where nnnn is the system number of the allowed system.
-
- It would obviously be good to let 1, your GC, your AC to go through your
- system untouched.
-
-
-
- ============================================================================
-
-
-
- The INI subsystem.
-
- The ini functions used here are based on the Asylum COMMON INI functions.
- The functions used here are placed in the Public Domain along with the rest
- of the program.
-
- A little note about it. The semi colon ';' can be used to comment a line,
- as in most ini setups.
-
-
-
-
-
- ────────────────────────────────────────────────────────────────────────────
- That is about it for the program.
-
- The Asylum Group (Zu Digital and Sam)
-