home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
ftp.wwiv.com
/
ftp.wwiv.com.zip
/
ftp.wwiv.com
/
pub
/
BBS
/
SBBS1B00.ZIP
/
DOCS.EXE
/
DOCS
/
CONFIG.DOC
< prev
next >
Wrap
Text File
|
1992-09-25
|
69KB
|
1,613 lines
Synchronet Configuration Documentation
======================================
Contents
~~~~~~~~
1.0 SCFG
2.0 Nodes
2.1 Toggle Options
2.2 Advanced Options
2.3 Modem Configuration
2.3.1 Result Codes
2.3.2 Auto-Configuration
2.4 Wait for Call Number Keys
2.5 Wait for Call Function Keys
3.0 System
3.1 Toggle Options
3.2 New User Values
3.3 Advanced Options
3.4 Security Level Values
3.5 Alternate Command Sets
3.6 Quick-Validation Values
4.0 Message Base
4.1 Message Groups
4.1.1 Message Sub-boards
4.1.1.1 Toggle Options
4.1.1.2 Network Options
5.0 File Transfers
5.1 File Libraries
5.1.1 File Directories
5.1.1.1 Toggle Options
5.2 Viewable Files
5.3 Testable Files
5.4 Extractable Files
5.5 Tranfer Protocols
5.6 Alternate File Paths
6.0 External Programs
6.1 Events
6.2 Editors
6.3 Online Programs
6.3.1 Online External Program Configuration Examples
7.0 Text File Sections
8.0 Networks
8.1 QWK Packet Networks
8.1.1 Network Hubs
8.1.1.1 Networked Sub-boards
8.2 FidoNet EchoMail and NetMail
1.0 SCFG
~~~~~~~~
SCFG is the Synchronet Configuration Utility that can be executed from the
"Waiting for call" screen by hitting 'C' or from DOS by typing SCFG from any
node directory. SCFG is a separate executable program and must load the
configuration information into memory upon initialization. Once SCFG has
initialized, you will see a main menu titled "Configure". To manipulate the
lightbar, use the up and down arrow keys or type a letter or number in the
option you wish to highlight. To highlight the first option of the menu, hit
HOME. To highlight the last option of the menu, hit END. You'll notice that if
you hit up arrow when the lightbar is at the first option of the menu, the last
option will become highlighted. This wrap effect also occurs when hitting the
down arrow when the lightbar is at the last option of the menu. To select the
current highlighted option, hit ENTER. To exit SCFG, hit ESC.
2.0 Nodes
~~~~~~~~~
You can configure any node from within SCFG regardless of what computer
(or virtual computer) you're using. To configure a node, select "Nodes" from
the SCFG "Configure" menu. You will then see a list of all the nodes installed
on your system. You will also see the bottom line of the screen now has two
additional key commands added, INS and DEL. INS and DEL are used to add and
delete nodes from the system. If you select one of the nodes listed, you will
receive another menu titled "Node x Configuration" which contains general
configuration information for this node and paths to more advanced
configuration menus. We will now discuss the options of this menu.
Name:
This is the name of the node. This parameter is not used for anything
but documentary purposes in the BBS.
Phone Number:
This is the phone number of this node in the format AAA-EEE-NNNN.
Logon Prompt:
This is what will be displayed to callers after the Synchronet version
and registration number, but before the NN: prompt.
Minimum Connect Rate:
This is the minimum modem connection rate that will be allowed. Callers
can still connect and attempt to logon, but without the 'M' exemption,
they will be told what minimum connect rate is and disconnected.
Minimum User Age:
This is the minimum age of new users that will be allowed.
Maximum User Age:
This is the maximum age of new users that will be allowed.
Minimum Main Level:
This is the minimum main level that a user needs to be able to logon
to this node.
Allowed (Required) Main Flags:
This is a list of Main Flags (MF) that a user must have to be able
to logon to this node. He can either be required to have any one of
the flags (Allowed) or have to have all of the flags (Required).'
Local Text Editor:
This is the command line to use when editing text files or messages
locally. This command line is not used when posting or sending e-mail
unless the above option is set to 'Yes'. If this option is not
specified, the default editor for the current user will be used. An
example (using Qedit as the editor) would be:
q %f
Assuming Q.EXE is in the DOS search path. If it isn't, you can specify
the location of the program. Example:
c:\qedit\q %f
The %f parameter will expand to the path and filename of the file to
edit.
Text Viewer:
This is the command line to use to view text files locally. Currently,
this command line is only used to view the system log files. You should
use a program that allows the text scrolling up and down as well as
string searches. A popular program for this use is Buerg's LIST.
If you are running multiple nodes and the program you wish to use
leaves the file open while viewing, you should use a batch file that
actual copies the file to view and then views the copy.
Example (if program name is LIST):
LISTIT.BAT:
@echo off
copy %1 list.tmp
list list.tmp
del list.tmp
An example for this field (using the LISTIT batch file) would be:
%!listit %f
The %! parameter specifies that the batch file is located in the
EXEC directory. If is not located there, you can remove the %! so that
the DOS search path will be searched for the batch file or specify
its location.
The %f parameter will expand to the path and filename of the file to
view.
2.1 Toggle Options
~~~~~~~~~~~~~~~~~~
Alarm When Answering:
If you would like have the BBS sound an alarm when answering the phone,
set this option to Yes.
Status Screen While WFC:
This node will display a screen with system usage statistics and the
current status of all active nodes.
Use Editor for Messages:
If this option is set to 'Yes' and you have specified a Local Text
Editor (next option), when logged on locally this editor will be used
for the creation of all messages.
2.2 Advanced Options
~~~~~~~~~~~~~~~~~~~~
Validation User:
This is the number of the user to whom validation feedback is sent.
This value will usually be set to 1 (the sysop). If this value is set
to 0, then new users will not be required to enter validation feedback.
Screen Length:
This is the length of the system screen or video window. This should
be set to "Auto-Detect" always, unless you have a specific reason
to force Synchronet to think the screen length is a certain value.
Cost Per Call:
This option should only be set to something nonzero for a billing
node. A billing node is a node attached to special phone line that will
automatically charge the caller a predetermined amount (usually area
code 900 or prefix 976 numbers). Set this value to the amount that the
caller will be billed after the initial 30 seconds. The user doesn't
actually access the BBS through this phone number as 900/976 services
charge the sysop by the minute an unrealistic amount. The user just
enters his or her name/alias and password and their account is credited
with the amount of credits per dollar specified in the System options
multiplied by this field (Cost per call) and the user is hung-up on.
The user then calls the normal BBS nodes and has instant access to
their purchased credits.
Daily Event:
This is the command line to execute when the first caller after
midnight logs off. If the program is located in the EXEC directory,
this command line should start with the %! specifier.
Merge Duplicate Text:
If this field is set to Yes, duplicate text strings found in TEXT.DAT
will use the same memory for storage. This can save memory, the amount
of which depends on how many duplicate strings are in TEXT.DAT, but
the reading of the TEXT.DAT upon SBBS initialization is slower due to
the string comparing.
Control Directory:
This is the path to the control directory where all the shared
configuration (.CFG) files for SBBS are stored. TEXT.DAT (the editable
ASCII file that contains almost all of the color and text that SBBS
displays) and a few miscellaneous binary data files are also stored
in this directory. All nodes of the system must have the same control
directory and this directory should not be located on a RAM disk.
Text Directory:
This is the path to the text directory. This is where all menus,
macros, SIF files, QWK files, system information, and other text
files are stored. All data beneath this directory branch is READ ONLY
as far as Synchronet is concerned, so changing this directory to a RAM
drive would enhance performance and wouldn't risk data loss. If you do
change this path, be sure to copy all the files and subdirectories of
the original text directory there. If you do change this path to a RAM
drive, you will need automate the copying of all of the files and
subdirectories there upon system startup (possibly AUTOEXEC.BAT) with a
sequence of commands like this:
md r:\text
xcopy c:\sbbs\text\*.* r:\text /S
Temporary Directory:
This is the path to the directory that this node will use for
temporary file storage. This directory must point to somewhere unique
and nonvolatile. All the files in this directory are deleted upon
execution of the BBS, so do not store any files you want to keep in
this directory. Each node must have its own temp directory. For
increased performance on batch uploads, it is best if this directory
is on the same disk drive as the majority of your file transfer
directories.
2.3 Modem Configuration
~~~~~~~~~~~~~~~~~~~~~~~
If you are not positive about the correct settings of any of the values on this
menu (other than COM Port), select Auto-Configuration and select your modem
type or a compatible modem.
COM Port:
This is the communications port that your modem is attached to. If you
are not using a modem, set this value to 0. If for some reason, you
do not specify the UART IRQ and I/O address, this number must be
relative to the BIOS data area (i.e. COM Port 1 refers to the first
COM Port found during your computers Power On Self Test). Normally,
when you select the COM Port, you should answer Yes to set the UART
IRQ and I/O address values to their defaults.
UART IRQ Line:
If you are not sure what IRQ line your modem's UART is using, select
the default for the COM Port number.
UART I/O Address:
If you are not sure what I/O address your modem's UART is using, select
the default for the COM Port number.
UART (DTE) Rate:
This is the data transfer rate between your computer and your modem.
If you're using a non-data-compressing, non-high-speed modem, this
should be set to your modem's highest DCE rate (i.e. 2400bps modem,
should use a 2400bps DTE rate). If you have a data-compressing or
high-speed modem, this value should be set to the highest DTE rate your
modem supports.
Hardware Flow Control:
If your modem supports CTS/RTS hardware flow control (usually
data-compressing or high-speed modems), set this option to Yes.
Initialization String:
This is the basic modem initialization command for SBBS. This option
should not be modified unless your unhappy with any of the settings
and are familiar enough with the Hayes AT command set to know the
consequences of the commands. As with all the modem command commands,
a tilde ('~') will produce a 500 millisecond pause.
Special Init String:
This is where additional initialization commands are placed for
specific modem types - usually error-correcting, data-compressing, or
high-speed modems.
Terminal Init String:
This is the initialization command given to the modem when Terminal
Mode is entered from the SBBS wait for call screen.
Dial String:
Not Yet Implemented.
Off Hook String:
This is the command sent to the modem when the phone is to be taken
off-hook (made busy).
Answer String:
This is the command sent to the modem when SBBS detects a ring.
Reinitialization Timer:
This field is used to automatically reinitialize the modem periodically
to make sure it is functioning correctly. If you find that your modem
works most of the time, but occasionaly will not answer or functions
incorrectly in other ways, you may wish to use this feature and set
it to a relatively low number (5 minutes or so). Setting this value
to 0 disables the periodic modem reinitialization function.
2.3.1 Result Codes
~~~~~~~~~~~~~~~~~~
This is a list of the numeric result codes (connection codes) supported by
your modem. For each result code, the numeric code, the DCE (connect) rate,
estimated file transfer CPS, and an 8 character description are stored. Hit INS
to add a result code above the highlighted one, or DEL to delete the
highlighted result code. You can have up to 500 result codes per node. If you
are not sure what the estimated transfer CPS is for a particular result code,
just divide the DCE rate by 10 and use that number (i.e. DCE rate of 9600bps
may have a rough estimate of 960cps through-put on file transfers).
2.3.2 Auto-Configuration
~~~~~~~~~~~~~~~~~~~~~~~~
Using this option you can let SCFG automatically set the values of the Modem
Configuration menu (except COM Port, UART IRQ, and UART I/O Address) by
selecting your modem from the available choices. If your modem is a 2400bps
Hayes compatible, select Hayes SmartModem 2400. If you have a high-speed
(9600bps or faster) modem and it is not in the auto-configuration list, select
Generic 9600 or Generic 14400 and then add any high-speed result codes that are
listed in your modem's manual, but not already in the result code list.
See 2.31 Result Codes for more information on adding result codes.
2.4 Wait for Call Number Keys
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This option lets you configure what command line will be executed for each
number key (0-9) while waiting for call. These commands will generally be
simple things that don't require much memory, such as listing the ERROR.LOG,
listing the GURU.LOG, editing a file, or any other simple functions. For large
program functions, see 2.5 Wait for Call Function Keys below.
2.5 Wait for Call Function Keys
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This option lets you configure what command line will be executed for each
function key (F1-F12) while waiting for call. These commands can execute just
about any program because Synchronet will shrink to 16k before executing it.
Popular uses for these shrinking commands would be running a terminal program
or other large applications.
3.0 System
~~~~~~~~~~
BBS Name:
This is the name of the BBS.
Location:
This is the city, state and/or other pertinent location information.
Operator:
This is the name of the system operator. Doesn't have to be the same
as user #1.
The Guru:
This is the name of the system's guru.
Password:
This is the super-secret system password that only sysops should know.
Allow Aliases:
If you wish the users of the BBS to be allowed to use aliases publicly,
set this option to Yes.
Users Can Change Password:
If you want enhanced system security, it is suggested that you force
users to keep the original randomly generated password they were
assigned by setting this option to No. If you do allow users to change
their passwords, you can make them change their password periodically
with this selection.
Days to Preserve Deleted Users:
If a user is deleted, his slot will be preserved for this many days
since his last logon date. Preserved slots will not be written over
by new users.
Maximum Days of Inactivity:
If you wish that users that haven't logged on in a certain number of
days be automatically deleted, set this value to the maximum number
of days a user can be inactive before he is deleted. Users can be
exempted from the automatic deletion with the 'P' exemption. Setting
this value to 0 disables this feature (Unlimited inactivity).
New User Password:
If this field has a value, new users will have to enter this password
correctly before being able apply for access.
3.1 Toggle Options
~~~~~~~~~~~~~~~~~~
Beep Locally:
If you wish to disable all bells locally, set this option to No.
Include Sysop in Statistics:
It is suggested that you set this option to No, so that the sysop's
activity on the BBS is not included in the usage statistics.
Closed to New Users:
If you wish to disallow access to any new users, set this option to
Yes.
Allow Anonymous E-mail:
You can disallow anonymous e-mail on your system by setting this option
to No. If this option is set to Yes, only users with the anonymous
exemption would be able to send anonymous e-mail.
Use Location In User Lists:
If you wish the location (City, State) of the user to be displayed
in user listings instead of the user note, set this option to Yes.
Setting this option to No will display the user's note (sysop created)
if one has been created.
Ask New Users for Address:
If you want new users to be prompted to enter their address and
zip/postal code, set this option to Yes.
Multi-Choice Computer Question:
If you want to use the multiple choice computer type questionaire
(COMPUTER.SIF) for the new users to specifiy their computer type, set
this option to Yes. Setting this option to No, will allow the user to
enter a free-form description of their computer of up to 40 characters.
3.2 New User Values
~~~~~~~~~~~~~~~~~~~
This option allows you to modifiy the security values assigned to a new user
after he completes his validation feedback. You can also set the number of
credits and minutes new users start off with. If you have configured alternate
command sets or external editors, you may select one of these as the default
for new users. See USEREDIT.DOC for more information.
3.3 Advanced Options
~~~~~~~~~~~~~~~~~~~~
BBS ID for QWK Packets:
This is the BBS ID used for QWK packets for offline message readers.
New User Magic Word:
If this field has a value, it is assumed the sysop would have put
some reference to this "magic word" in NEWUSER.MSG and the user
will be prompted for this after he enters his own assigned password.
If he doesn't enter it correctly, it is assumed he didn't read the
text displayed to him and he is disconnected.
Data Directory:
This is the path to the directory where all the data files for SBBS
are stored. This value should not be changed unless necessary.
Index Directory:
This is the path to the directory where all the index files for SBBS
are stored. This value should not be changed unless necessary.
Executables Directory:
This is the path to the directory where all the executable files for
SBBS are store. This value should not be changed unless necessary.
Pause During Logon:
If the LOGON.ANS or ANSWER.ANS files have animated ANSI sequences
in them, you will want to set this option to No. If you have important
information in either of these files that you do not want to scroll
off the user's screen regardless of whether the user has pause enabled
or not, set this option to Yes. If you don't care one way or the other,
set this option to User Default. The suggested setting is Yes.
Input SIF Questionnaire:
This is the name of a SIF file that resides the text directory that
all users will be prompted to answer upon logging on the first time.
See SIF.DOC for more information.
Output SIF Questionnaire:
This is the name of the SIF file that is used by the sysop to view
the users' answers to the input SIF questionnaire. If this value is
left blank, the input SIF questionnaire is used. This output SIF
questionable should be identical to the input SIF with the exception
of the text content. See SIF.DOC for more information.
Credits Per Dollar:
This is the monetary value of a credit (How many credits per dollar).
This value should be a power of 2 (1, 2, 4, 8, 16, 32, 64, 128, etc.)
since credits are usually converted by 100 kilobyte (102400) blocks.
To make a dollar worth two megabytes of credits, set this value to
2,097,152 (a megabyte is 1024*1024 or 1048576).
Minutes Per 100k Credits:
This is the value of a minute of time online. Credits can be converted
to minutes by the user with the &C command from the main menu. Credits
are only converted in 100k (102400) blocks. This field is the number
of minutes to give the user in exchange for the 100k credit block.
Maximum Number of Minutes:
This value is the maximum total number of minutes a user can have. If
the user has this number of minutes or more, he will not be allowed
to convert credits into minutes. A sysop can add minutes to a user's
account regardless of this maximum. If this value is set to 0, the
user will have no limit on the total number of minutes he can have.
Message 'To' Field:
This is the format of the 'To' field displayed at the top of messages
(posts and e-mail). It can include Ctrl-A codes for color changes.
Message 'Title' Field:
This is the format of the 'Title' line in messages.
Message 'From' Field:
This is the format of the 'From' line in messages.
Message 'Date' Field:
This is the format of the 'Date' line in messages.
3.4 Security Values
~~~~~~~~~~~~~~~~~~~
This is where you define the values of the Main Security Levels (MLs) (0-99).
The parameters are: time per day, time per call, calls per day, and lines per
message. These limits are assigned to all users by ML.
3.5 Alternate Command Sets
~~~~~~~~~~~~~~~~~~~~~~~~~~
This option allows the sysop to add or modify alternate command sets. Alternate
command sets are replacement key commands for the Synchronet command set. The
sections of the BBS with configurable commands are the main, transfer, message
reading, and mail reading menus. For each command set, the sysop can change
each command key into another (unique) command that may be more familar to
some users. Each alternate command set has separate menus for the above
mentioned sections. These menus are stored in a sub-directory off of TEXT\MENU.
The name of this sub-directory is configured separately for each command set.
The sysop must create this sub-directory and the menus within. See CUSTOM.DOC
for more information on the creation/modification of menus and the filename and
extension formats.
3.6 Quick Validation Values
~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is where you define the values of the quick-validation sets (0-9). These
are used to quickly set a user's ML, TL, MF, TF, Restrictions and Exemptions.
A user can be quick-validated by hitting Alt-(0-9) while the user is online,
or with the 'V' command from User Edit.
4.0 Message Base
~~~~~~~~~~~~~~~~
This selection allows you to configure message groups and sub-boards. After
selecting "Message Base" from the "Configure Menu", you will see a menu titled
"Message Groups" and the options will be the currently configured message
groups.
4.1 Message Groups
~~~~~~~~~~~~~~~~~~
This menu is typical of the variable length option menus in SCFG. Press INS
to delete a message group or DEL to delete a message group and all of its
sub-boards. If the number of groups exceeds the displayable area of the
screen, an arrow will appear at the bottom left of the menu specifying that
the menu can be scrolled down to access more options. If the menu is scrolled
down and is not currently at the last option, an arrow is displayed in the
upper left of the option area of the menu specifying that the menu can be
scrolled up to access more options. Pressing INS allows inserts will add
a message group above the currently selected one. If you wish to add a message
group to the end of the list, go to the blank option at the bottom of the menu
before pressing INS. You can have up to 10,000 message groups. To edit the
values associated with a message group, select the group by pressing ENTER when
it is highlighted. Another menu will appear with the following options:
Long Name:
This is a description of the message group which is displayed when
a user of the system uses the '/*' command from the main menu.
Short Name:
This is a description of the message group which is used for main menu
and sub-board scanning prompts.
Minimum Age:
This is the minimum age of a user that is allowed to access this group.
Minimum Main Level:
This is the minimum ML of a user that is allowed to access this group.
Allowed (Required) Main Flags:
This is the set of main flags that are necessary for the user to access
this group. You can optionally set the requirement to be any one of the
flags in this value (Allowed), or all of the flags in this value
(Required).
4.1.1 Message Sub-boards
~~~~~~~~~~~~~~~~~~~~~~~~
The list of sub-boards menu is very similar to the message groups menu. The
use of the INS and DEL keys remains consistent and to select a sub-board, you
use the enter key. Only the sub-boards that belong to the current selected
message group are displayed. You can have up to 20,000 total sub-boards. The
following options are available after selecting a sub-board to view or edit.
Long Name:
This is a description of the sub-board which is displayed when a user
hits '*' at the main menu.
Short Name:
This is a description of the sub-board which is used for the main menu
and sub-boards scanning prompts.
QWK Name:
This is the name of the sub-board used for QWK packets. This name
is limited to only 10 characters.
Minimum Age:
This is the minimum age of a user that will be allowed access to the
sub-board.
Minimum Level to Read:
This is the minimum main level (ML) required for read access to the
sub-board.
Minimum Level to Post:
This is the minimum ML required for posting access on the sub-board.
Setting this value lower than the read access will have no effect.
Allowed (Required) Flags to Read:
This is the set of main flags that are necessary for the user to have
read access to this sub-board. You can optionally set the requirement
to be any one of the flags in this value (Allowed), or all of the flags
in this value (Required).
Allowed (Required) Flags to Post:
This is the set of main flags that are necessary for the user to be
able to post on this sub-board. You can optionally set the requirement
to be any one of the flags in this value (Allowed), or all of the flags
in this value (Required).
Internal Code:
This is an internal code for SBBS to distinguish this sub-board from
the others on the system. This must be a unique name of up to 8 valid
DOS filename characters.
Maximum Number of Messages:
This is the maximum number of messages that will be allowed on the
sub-board. Once the maximum number of messages is reached, a new post
on the sub-board will purge (or roll-off) the first post on the sub
so that the total number of posts never exceeds the maximum. Posts can
be flagged non-purgable by the sysop. If all the posts on a sub-board
are non-purgable and the maximum number of posts is reached, no one
will be allowed to post new messages on that sub-board.
4.1.1.1 Toggle Options
~~~~~~~~~~~~~~~~~~~~~~
Allow Private Posts:
If you want to allow users to post private messages to another user
on the sub-board, set this option to Yes. Since Synchronet has an
internal e-mail system, this option is usually only set to Yes on
networked sub-boards that allow private posts. You can also force
private posts on this sub-board by setting this option to Only.
Allow Anonymous Posts:
If you want to allow users that have the 'A' exemption to be able to
post anonymously on this sub-board, set this option to Yes. You may
also force anonymous posts by any one (with or without the 'A'
exemption) by setting this option to Only.
Post Using Real Names:
If you wish posts on this sub-board to be posted using the real name
of a user instead of his/her alias, set this option to Yes. Many
networks require BBSs that allow aliases to force real names on
networked sub-boards.
Users Can Delete Posts:
You may allow users to delete their posted messages by setting this
value to Yes. You may allows users to delete their messages only if
it is the last message on the sub-board by setting this value to
Last.
Forced New Scan:
If this option is set to Yes, the sub-board will not be skipped in
new message scans even if the user has configured his or her new scan
to not contain this sub-board.
Public 'To' User:
If you wish all posts to be prompted for a 'To' user, set this option
to Yes. Many networks do not allow private messages on networked
sub-boards, so the only way to send a message 'To' someone is to send
it publicy with a 'To' field. Normally, 'To' users are only prompted
for on private posts.
4.1.1.2 Network Options
~~~~~~~~~~~~~~~~~~~~~~~
Append Tag/Origin Line:
If you want a tagline (QWK network) or origin line (FidoNet) to be
appended to messages sent out on the network from this sub-board,
set this option to Yes.
QWK Networked:
Setting this option to Yes will limit posted message titles to the
QWK packet limitation of 25 characters.
QWK Tagline:
This is an optional tagline that will be used for this sub-board. If
this field is blank, the default tagline will be used. If "Append
Tag/Origin Line" is set to No, then no tagline will be used.
FidoNet EchoMail:
If this sub-board is networked via FidoNet, set this option to yes.
FidoNet Address:
This is the FidoNet address used for this sub-board.
EchoMail Origin Line:
This is an optional origin line that will be used for this sub-board.
Do not include the FidoNet address in this line. Synchronet
automatically as the " * Origin: " and "(Zone:Net/Node.Point)".
If this field is blank, the default origin line will be used. If
"Append Tag/Origin Line" is set to No, then no origin line will be
used.
EchoMail Directory:
This is the storage directory where FidoNet style (FTS-0001 stored
message format) messages are imported from and exported to for this
sub-board. If this option is blank, then the EchoMail base directory
is used with the internal code of this sub-board as the sub-directory
where the FidoNet messages are stored.
5.0 File Transfers
~~~~~~~~~~~~~~~~~~
This section allows you to configure various options that relate to the file
transfer section of Synchronet.
Min Bytes Free Disk Space:
This is the minimum about of disk space (in kilobytes) that is
necessary for a user to be allowed an upload.
Max Files in Batch UL Queue:
This is the maximum number of files that can be stored in the batch
upload queue. The definite maximum is 500 files.
Max Files in Batch DL Queue:
This is the maximum number of files that can be stored in the batch
download queue. The definite maximum is 500 files.
Max Users in User Transfers:
This is the maximum number of destination users in user to user
transfers. The definite maximum is 500 users.
Credit Value in Bytes:
This is the value of one credit in bytes. It is suggested that this
value be set to 1, so that every credit is worth one byte.
Percentage of Credits for Upload:
This is the percentage of the credit value of a file that is given to
the uploader of a file upon a successful upload. The suggested value
is 100 percent.
Percentage of Credits for Download:
This is the percentage of the credit value of a file that is given to
the uploader of a file upon a successful download of the file by
another user. The suggested value is 90 percent.
Leech Protocol Detection Percentage:
This value is the sensitivity of the leech protocol detection feature
of Synchronet. If the transfer is apparently unsuccessful, but the
transfer time was at least this percentage of the estimated transfer
time (based on the estimated CPS of the connection result code), then
a leech protocol error is issued and the user's leech download counter
is incremented. Setting this value to 0 disables leech protocol
detection.
Extension for Temp Files:
This is the file extension that will be used in the creation of
temporary download files. The suggested extension is ZIP.
Command to Create Temp Files:
This is the command line used to create a temporary archive in the
temp directory. The program that this line executes should match the
extension for temp files (see above). The suggested command line is:
%!pkzip %f %s
Remember, PKZIP must be in your EXEC directory for the above command
line to work. The '%!' specificier is an abreviation for your EXEC
directory. Either remove the '%!' from the command line (assuming
PKZIP is in your DOS search path), or more preferably, specify the
exact location of PKZIP. Example: C:\BIN\PKZIP %f %s
5.1 File Libraries
~~~~~~~~~~~~~~~~~~
This selection produces a list of file transfer libraries. You can add and
delete libraries in the same fashion as message groups. If you select a
file library, you can view or edit its values and all the file directories
that belong to it. The options for each transfer library are as follows:
Long Name:
This is a description of the library and is displayed when the user
uses the '/*' command from the transfer menu.
Short Name:
This is a description of the library and is displayed at the transfer
prompt.
Minimum Age:
This is the minimum age of users that are allowed access to the
library.
Minimum Transfer Level:
This is the minimum transfer level (TL) that a user can have to access
the library.
Allowed (Required) Transfer Flags:
This is the set of transfer flags (TF) that are necessary for the user
to have read access to this sub-board. You can optionally set the
requirement to be any one of the flags in this value (Allowed), or all
of the flags in this value (Required).
5.1.1 File Directories
~~~~~~~~~~~~~~~~~~~~~~
This selection produces a list of directories that belong to the current
library. The available options for each directory are as follows:
Long Name:
This is a description of the file directory that is displayed when
the user uses the '*' command from the transfer section.
Short Name:
This is a description of the file directory that is displayed at
the transfer section prompt. Some short names have a predetermined
meaning:
Temp:
This short name is reserved and cannot be used.
Offline:
This short name specifies that this directory is to hold
offline files for the selected library and is treated a bit
differently than other directories. It will not be included
in new-scans and will be the default location of files that
are removed or moved. A directory with this short name should
have the upload level set to 90 and the access level and flags
set the same as the library. There can only be one directory
per library with this short name.
Sysop:
This short name specifies that this directory will be the
destination for files uploaded by users with the 'Z' command
from the transfer section. There should only be one directory
with this short name and it should belong to the most
accessible library. A directory with this short name should
have the access level set to 90 and the upload level and flags
set the same as the library.
User:
This short name specifies that this directory will be the
storage point for user to user transfers. There should only be
one directory with this short name and it should belong to the
most accessible library. Users can upload a file to another
user or group of users with the '/U' transfer section command.
Users download files sent to them with the '/D' transfer
section command. A directory with this short name should have
the access level set to 90 and the upload level and flags
set the same as the library or at whatever level the sysop
wishes to allows users to use the user to user transfer
facilities.
Minimum Age:
This the minimum required user age to access this directory.
Minimum Level to Access:
This is the minimum required transfer level (TL) for users to access
this directory. Directories with a short name of Sysop or User should
have this value set to 90 so that only sysops can list the contents
of the directory.
Minimum Level to Upload:
This is the minimum required transfer level (TL) for users to upload
to this directory. Directories with a short name of Offline should
have this value set to 90 so that only sysop can upload files to this
directory.
Allowed (Required) Flags to Access:
This is a list of transfer flags (TF) that are required for a user
to have access to this directory. The number of flags required can be
set to One (Allowed) or All (Required).
Allowed (Required) Flags to Upload:
This is a list of transfer flags (TF) that are required for a user
to have access to this directory. The number of flags required can be
set to One (Allowed) or All (Required).
Internal Code:
This is an internal code for SBBS to distinguish this directory from
the others on the system. This must be a unique name of up to 8 valid
DOS filename characters. The code TEMP is reserved and cannot be used.
Extensions Allowed:
This is a list of file extensions (separated by commas) that are
allowed to be uploaded to this directory.
Default Extension:
This is the default extension used when a user views or extracts
files without specifying the extension.
Sort Value and Direction:
Directories can be sorted either by filename or upload date in an
ascending or descending order. This option selects the value to sort
on and in which direction.
Transfer File Path:
This is the actual path for the storage of the files that belong to
this directory. If no path is specified, the directory DATA\DIRS\CODE,
where CODE is the internal code for this directory, will be used to
store the files.
Maximum Number of Files:
This is the maximum number of files that will be allowed in this
directory.
5.1.1.1 Toggle Options
~~~~~~~~~~~~~~~~~~~~~~
Check for File Existence:
If this option is set to 'Yes', when files are listed in the transfer
section, each file is checked to see if it actually exists in the
DOS directory. If the file doesn't exist, the credit value is displayed
in high intensity blinking and is followed by a minus symbol. Setting
this option to 'No' speeds up the file listings, but files not actually
on disk will appear just as the others. Directories with a short name
of Offline should have this value set to 'No' as they should solely
contain files that aren't actually in the DOS directory. Directories
that are stored on CD-ROM or other slow random access device should
have this option set to 'No'.
Copy to Temp Directory:
If this option is set to 'Yes', files will be copied from the normal
storage directory into the temp directory and downloaded from there.
This option is helpful in reducing the overhead associated with
multiple simultaneous user access to a slow storage device such as
CD-ROM.
Force Content Ratings:
If this option is set to 'Yes', when a user uploads a file he is
prompted to rate the content of the file he is uploaded with a rating
of G, R, or X, and the file description will begin with the rating
letter contained in brackets.
Multiple File Numberings:
If this option is set to 'Yes', when a user uploads a file he is
asked if the file he is uploading is part of a set of files. If the
user answers 'Yes', he is then prompted for the total number of files,
the number of the file he is uploading, and the file description will
end with the numbering in the format "[n/t]", where n is the file
number and t is the total number of files.
Extended Descriptions:
If this option is set to 'Yes', users will be prompted if they wish
to create an extended description for the file upon uploading. An
extended description is a message, much like e-mail or a post, that is
attached to the file and displayed when the extended file information
is displayed. If an extended description has been created for a file,
a plus sign will appear after the filename in the file listings.
Free Downloads:
If you want all files downloaded from this directory to be free for
the downloader (not cost any credits regardless of the credit value),
set this option to Yes.
Credit Uploads:
If you want users who upload files to this directory to get credit
for their upload based on the "Percentage of Credits for Upload", set
this value to Yes.
Credit Downloads:
If you want users who upload files to this directory to get credit
for subsequent downloads of the file based on the "Percentage of
Credits for Download", set this value to Yes.
Anonymous Uploads:
If you want users with the 'A' exemption to be able to upload file
anonymously to this directory, set this option to Yes. If you want all
uploads to this directory to be automatically forced anonymous, set
this option to Only.
5.2 Viewable Files
~~~~~~~~~~~~~~~~~~
This is a list of file types that have content information that can be viewed
through the execution of an external program. Here are a couple of command line
examples for a few file types.
ZIP %!pkunzip -v %s
ARJ %!arj l %s
GIF %!gifdir %s
TXT type %s
5.3 Testable Files
~~~~~~~~~~~~~~~~~~~
This is a list of file types that will have a command line executed to test
the file integrity upon their upload. The file types are specified by extension
and if one file extension is listed more than once, each command line will
be executed. The command lines must return a DOS error code of 0 (no error)
in order for the file to pass the test. This method of file testing upon upload
is also known as an upload event. This test or event, can do more than just
test the file, it can perform any function that the sysop wishes. Such as
adding comments to an archived file, or extracting an archive and performing
a virus scan. While the external program is executing, a text string is
displayed to the user. This "working" string can be set for each file type
and command line listed. Here are some example command lines and working
strings for various file types:
ZIP %!pkunzip -t %f Testing ZIP Integrity...
ZIP %!pkzip -z %f < ..\TEXT\ZIPMSG.TXT Adding ZIP Comment...
ARJ %!arj t %f Testing ARJ Integrity...
GIF %!gt %f Testing GIF Integrity...
5.4 Extractable Files
~~~~~~~~~~~~~~~~~~~~~
This is a list of archive file types that can be extracted to the temp
directory by an external program. The file types are specified by their
extension. For each file type you must specify the command line used to extract
the file(s). Here are some example command lines for extracting various files:
ZIP %!pkunzip -o %f %g %s
ARJ %!arj e %f %g %s
Notes on command lines syntax:
The use of conversion specifiers are supported in all command lines
within SCFG. Conversion specifiers are proceeded by a percent (%)
symbol and are not case sensitive. The above command line examples use
the following specifiers:
%! EXEC directory:
If the program you are executing with this command line is not
located in your EXEC directory, you can specify the directory
where the program is located or, if the program is in your
search path, start the command line with just the program name
(no prefix). We suggest specifying the location of the program
for security reasons.
%f Filename:
This is the filename of the archive that is to be extracted.
%g Temp Directory:
This is the path to the temp directory. In the above command
lines, it is the destination of the extracted files.
%s File Specification:
This is the file specification to extract from the archive.
See SPECS.DOC for a complete list of the available specifiers.
5.5 Transfer Protocols
~~~~~~~~~~~~~~~~~~~~~~~
This is a list of file transfer protocols that can be used to transfer files
either to or from a remote user. For each protocol, you can specify the
mnemonic (hot-key) to use to specify that protocol, the command line to use for
uploads, downloads, batch uploads, batch downloads, bidirectional file
transfers, and the support of DSZLOG. If the protocol doesn't support a
certain method of transfer, or you don't wish it to be available for a certain
method of transfer, leave the command line for that method blank. Be advised,
that if you add or remove any transfer protocols, you will need to edit the
protocol menus (ULPROT, DLPROT, BATUPROT, BATDPROT, and BIPROT) in the
TEXT\MENU directory accordingly. The '%f' command line specifier is used to
represent the filename or batch file list. The following is a list of example
protocol configurations:
DSZ Xmodem:
Mnemonic X
Upload Command Line %!dsz port %p estimate 0 %e rx %f
Download Command Line %!dsz port %p estimate 0 %e sx %f
Batch UL Command Line
Batch DL Command Line
Biddir Command Line
Uses DSZLOG Yes
DSZ Ymodem:
Mnemonic Y
Upload Command Line %!dsz port %p estimate 0 %e rb %f
Download Command Line %!dsz port %p estimate 0 %e sb %f
Batch UL Command Line %!dsz port %p estimate 0 %e rb %g
Batch DL Command Line %!dsz port %p estimate 0 %e sb @%f
Biddir Command Line
Uses DSZLOG Yes
DSZ Zmodem:
Mnemonic Z
Upload Command Line %!dsz port %p estimate 0 %e rz %f
Download Command Line %!dsz port %p estimate 0 %e sz %f
Batch UL Command Line %!dsz port %p estimate 0 %e rz %g
Batch DL Command Line %!dsz port %p estimate 0 %e sz @%f
Biddir Command Line
Uses DSZLOG Yes
DSZ Ymodem-G:
Mnemonic G
Upload Command Line %!dsz port %p estimate 0 %e rb %f
Download Command Line %!dsz port %p estimate 0 %e sb %f
Batch UL Command Line %!dsz port %p estimate 0 %e rb -g %g
Batch DL Command Line %!dsz port %p estimate 0 %e sb @%f
Biddir Command Line
Uses DSZLOG Yes
HS/Link:
Mnemonic H
Upload Command Line
Download Command Line
Batch UL Command Line %!hslink -i2 -p%p -e%e -u%g
Batch DL Command Line %!hslink -i2 -p%p -e%e -nu @%f
Biddir Command Line %!hslink -i2 -p%p -e%e -u%g @%f
Uses DSZLOG Yes
BiModem:
Mnemonic B
Upload Command Line
Download Command Line
Batch UL Command Line %!bimodem /l%p /b%e
Batch DL Command Line %!bimodem /l%p /b%e
Biddir Command Line %!bimodem /l%p /b%e
Uses DSZLOG Yes
5.6 Alternate File Paths
~~~~~~~~~~~~~~~~~~~~~~~~
This option allows the sysop to add and configure alternate file paths for
files stored on drives and directories other than the configured storage path
for a file directory. This command is useful for those who have one file
directory were they wish to have files listed from multiple CD-ROMs or hard
disks.
See ALTUL in SYSOP.DOC for more information.
6.0 External Programs
~~~~~~~~~~~~~~~~~~~~~
This selection will spawn a menu from you can select "Events", "Editors",
or "Online Programs". Events are event or time initiated programs, Editors
are external text editors, and Online Programs are external programs or games
(often referred to as doors) that are available to the users while online with
the 'X' command from the main section. An XTRN directory is created off of your
main SBBS directory upon installation and it is suggested you create a
subdirectory for each of your external programs off of this directory.
Synchronet Blackjack is, by default, installed in XTRN\SBJ and the Synchronet
External Programs Software Development Kit for C Programmers is installed in
the XTRN\SDK directory.
6.1 Events
~~~~~~~~~~
Logon Event:
This is the command line for a program that will execute during the
logon sequence of every user. The program cannot have user interaction.
The program will be executed after the LOGON message is displayed and
before the logon user list is displayed. If you wish to place a program
in the logon sequence of users that includes interaction or requires
account information, you probably want to use an online external
program configured to run as a logon event. See 6.3 Online Programs
for more information.
Logoff Event:
This is the command line for a program that will execute during the
logoff sequence of every user. This program cannot have user
interaction because it is executed after carrier is dropped. If you
wish to have a program execute before carrier is dropped, you probably
want to use an online external program configured to run as a logoff
event. See 6.3 Online Programs for more information.
Daily Event:
This is the command line for a program that will run after the first
user that logs on after midnight, logs off (regardless of what node).
Timed Event:
This is the command line for a program that will run at a specified
time every day.
Event Time:
This is the time (in 24hr format) for the above mentioned program
to execute.
Event Node:
This is the node that will execute the event and can optionally be
set to run exclusively (all other nodes inactive) by selecting this
option.
6.2 Editors
~~~~~~~~~~~
This selection will bring up a list of external editors that are available
as alternatives to the Synchronet built-in editor. Editors can be added and
deleted with the INS and DEL keys. Selecting an editor allows you to view
and edit its settings. The available settings are:
Name:
This is a description of the editor.
Local Command Line:
This is the command line to use when the user is online locally.
Remote Command Line:
This is the command line to use when the user is online remotely.
6.3 Online Programs
~~~~~~~~~~~~~~~~~~~
This selection will generate a list of the installed online external programs.
You can add and remove external programs from this list with the INS and DEL
keys. If you select an external program, you can edit it's configuration. The
available configuration options are:
Name:
This is a description of the external program.
Command Line:
This is the command line to execute.
Clean-up Command Line:
Some external programs require a second program to be executed
immediately after the main program is. If the program your configuring
is such a program, you specify the necessary command line here.
Minimum Main Level:
This is the minimum main level required to access this program.
Allowed (Required) Main Flags:
This is a list of Main Flags (MF) that a user must have to be able
to run this program. He can either be required to have any one of
the flags (Allowed) or have to have all of the flags (Required).
ANSI Required:
If this option is set to 'Yes', the user must have ANSI enabled in
his defaults to access this program.
Multiuser:
If this option is set to 'Yes', Synchronet will allow multiple
simultaneous users to run it. If set 'No' it will handle rejecting
users who attempt to run it while another is currently running it.
Write to Log File:
If this option is set to 'No', the entry in the BBS data file will
not contain the name of the log file to write to, thus disallowing
the program to write to the log.
Intercept I/O Interrupts:
If the program you are configuring does not have its own COM I/O
routines, does not require a FOSSIL driver, and uses DOS for output,
set this option to 'Yes'. This option cannot be enabled in conjunction
with "Shrink BBS".
Shrink BBS:
If this option is set to 'Yes', Synchronet will remove all but 16k
of itself before running the program. This option cannot be used
in conjunction with "Intercept I/O Interrupts", "Modify User Data",
"Uses WWIV Color Codes", or "Execute on Event". If there isn't enough
memory available to execute an external program, you may wish to
enable this option, or switch to the overlay version of Synchronet
by changing your SBBS.BAT in your node directory to read:
@..\exec\sbbsovl %1 %2 %3 %4 %5
You can check the amount of available memory from within Synchronet
by using the sysop main menu command ";MEM".
See SYSOP.DOC for more information.
Modify User Data:
If this option is set to 'Yes' and the program creates the file
MODUSER.DAT in the node directory, Synchronet will read this file
upon returning and modify the user's data accordingly. This option
cannot be used in conjunction with "Shrink BBS".
Execute on Event:
You can optionally have this program execute on a certain user
initiated event. This option can not be used in conjunction with
"Shrink BBS". The available events are:
Logon:
After the LOGON message is displayed this program will be
executed.
Logoff:
After the user initiates logoff with the 'O' command from the
main or transfer sections, but before the LOGOFF message is
displayed. The '/O' command does not initiate this event.
New User:
After a new user has sent validation feedback, this program
will be executed.
After selecting an event type, you will be asked if this program is
to execute as an event only. If you select 'Yes', this program will
not be available through the external programs menu ('X' main section
command).
Uses WWIV Color Codes:
If this option is set to 'Yes', any Ctrl-C# (where # digit from 0-9)
will be expanded into ANSI escape sequences. This option must be used
in conjunction with "Intercept I/O Interrupts" and cannot be used in
conjunction with "Shrink BBS".
BBS Data File Type:
This is the data file type created by the BBS for the external program
to read and obtain information about the BBS and user that has run
the program. This is often referred to as a door file. The available
file types are:
None:
No data file is required.
SBBS XTRN.DAT:
For use with programs designed to run under Synchronet.
WWIV CHAIN.TXT:
For use with programs designed to run under WWIV or other
CHAIN.TXT compatible BBS software.
GAP DOOR.SYS:
For use with programs designed to run under GAP or other
DOOR.SYS compatible BBS software.
RBBS DORINFO#.DEF:
For use with programs designed to run under RBBS, QuickBBS,
RemoteAccess, or other DORINFO#.DEF compatible BBS software.
WildCat CALLINFO.BBS:
For use with programs designed to run under WildCat, Genesis,
or other CALLINFO.BBS compatible BBS software.
6.3.1 Online External Program Configuration Examples
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The following are configuration examples for some popular online programs
(all games), including Synchronet Blackjack! which comes free with Synchronet.
You will find example batch files in the EXEC directory for the execution of
each of the following programs.
Name Global War
Command Line %!gwar %f %#
Clean-up Command Line
Minimum Main Level 0
Allowed Main Flags
ANSI Required Yes
Multiuser Yes
Write to Log File No
Intercept I/O Interrupts No
Shrink BBS No
Modify User Data No
Uses WWIV Color Codes No
Execute on Event No
BBS Data File Type WWIV CHAIN.TXT
Name Trade Wars 2002
Command Line %!twar %f %h
Clean-up Command Line
Minimum Main Level 0
Allowed Main Flags
ANSI Required No
Multiuser No
Write to Log File No
Intercept I/O Interrupts No
Shrink BBS Yes
Modify User Data No
Uses WWIV Color Codes No
Execute on Event No
BBS Data File Type WWIV CHAIN.TXT
Name Food Fight!
Command Line %!food %f
Clean-up Command Line
Minimum Main Level 0
Allowed Main Flags
ANSI Required No
Multiuser No
Write to Log File No
Intercept I/O Interrupts Yes
Shrink BBS No
Modify User Data No
Uses WWIV Color Codes Yes
Execute on Event No
BBS Data File Type WWIV CHAIN.TXT
Name Dice War
Command Line %!dicewar %n
Clean-up Command Line %!dwclean %n
Minimum Main Level 0
Allowed Main Flags
ANSI Required No
Multiuser Yes
Write to Log File No
Intercept I/O Interrupts Yes
Shrink BBS No
Modify User Data Yes
Uses WWIV Color Codes No
Execute on Event No
BBS Data File Type SBBS XTRN.DAT
Name Synchronet Blackjack!
Command Line %!sbj %n /l
Clean-up Command Line %!sbjclean %n
Minimum Main Level 0
Allowed Main Flags
ANSI Required No
Multiuser Yes
Write to Log File No
Intercept I/O Interrupts Yes
Shrink BBS No
Modify User Data Yes
Uses WWIV Color Codes No
Execute on Event No
BBS Data File Type SBBS XTRN.DAT
Name Synchronet Blackjack! (No Risk)
Command Line %!sbj %n
Clean-up Command Line %!sbjclean %n
Minimum Main Level 0
Allowed Main Flags
ANSI Required No
Multiuser Yes
Write to Log File No
Intercept I/O Interrupts Yes
Shrink BBS No
Modify User Data No
Uses WWIV Color Codes No
Execute on Event No
BBS Data File Type SBBS XTRN.DAT
7.0 Text File Sections
~~~~~~~~~~~~~~~~~~~~~~
This selection will produce a list of text file sections that the sysop has
created for users to freely view text files. It is requested that all sysops
make some or all of the Synchronet documentation available in a text file
section. At the very minimum, TEXT\SBBS.MSG should be available for users to
review. You can add and remove sections with the INS and DEL keys. The
following configuration options are available for each section:
Name:
This is a description of the text file section.
Minimum Age:
This is the minimum required user age for access to this section.
Minimum Main Level:
This is the minimum required main level for a user to access this
section.
Allowed (Required) Main Flags:
This is a list of Main Flags (MF) that a user must have to be able
to access this section. He can either be required to have any one of
the flags (Allowed) or have to have all of the flags (Required).
Internal Code:
This is an internal code for SBBS to distinguish this text file section
from the others on the system. This must be a unique name of up to 8
valid DOS filename characters.
8.0 Networks
~~~~~~~~~~~~
Selecting this option will produce a list of available network technologies.
Select the network technolgoy of your interest and refer to the following
section that pertains to your selected network technology.
8.1 QWK Packet Networks
~~~~~~~~~~~~~~~~~~~~~~~
QWK Packet Networks are message networks based on the QWK message packet
format. Since Synchronet internally support QWK packet networks, QWK Hubs
do not need any additional software and QWK Nodes only require a communications
program with scripting ability to perform the call-out and obtain the packets
from the QWK Hubs.
There are two options from the QWK Packet Networks menu, Network Hubs and
Default Tagline. Selecting the Default Tagline will allow you to create or
edit the tagline that will be used for messages that are sent out on the
network from your QWK netted sub-boards. Individual sub-boards can have a
different tagline to override this one, or use no tagline at all. Ctrl-A codes
can be used in taglines so that other Synchronet systems will see the tagline
in your preferred color scheme. The beginning of the tagline is not
configurable. It consits of a tear line and the Synchronet product name:
---
■ Synchronet ■
Configured tagline text will attached to the end of the above tagline.
8.1.1 Network Hubs
~~~~~~~~~~~~~~~~~~
Selecting this option produces a list of configured hubs that your system
calls to upload REP packets to and download QWK packets from. If a system
calls your system for messages, it is a node and your system is the hub and you
should not have that system listed as a hub. If you do not call any systems
for networked messages, then your system is a hub and the only configuration
you need to do is set your taglines and the network options for each of your
netted sub-boards. Use INS to add hubs and DEL to delete hubs from this hub
list.
For each hub the following options are available:
Hub System ID:
This is the QWK system ID of the hub.
Pack Command Line:
This is the command line to execute to pack messages.
Unpack Command Line:
This is the command line to execute to unpack messages.
Call-out Command Line:
This is teh command line to execute to perform the call-out.
Call-out Node:
This is the number of the node which should peform the call-out.
Call-out Days:
These are the days to perform the call-out.
Call-out Time/Frequency:
This is either the specific time to call-out, or the number of times
per day to call-out.
8.1.1.1 Networked Sub-boards
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is the list of sub-boards that are networked with this hub. For each
sub-board the following options are available:
Sub-board:
Which sub-board is to be networked (Group and Sub-board name).
Conference Number:
This is the conference number of the sub-board on the HUB system.
If the hub is a Synchronet BBS and the sub-board is the second
sub-board in the first group, the conference number is 102; if the
sub-board is the first sub-board in the third group, the conference
number is 301, etc. The conference numbering scheme for BBS programs
other than Synchronet is usually just 1, 2, 3, etc.
Ctrl-A Codes:
This option allows you to determine how to handle Ctrl-A codes in
messages. If the hub is a Synchronet BBS, you will want to set this
to "Leave in". If the hub is not a Synchronet BBS, you will almost
always want to set this to "Strip out". If the hub is not a Synchronet
BBS, but allows ANSI escape sequences in messages, set this option
to "Expand to ANSI".
8.2 FidoNet EchoMail and NetMail
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FidoNet networking requires the use of the SBBSFIDO utility, a FidoNet
front-end mailer, and possibly an EchoMail Scan/Toss utility. For information
on SBBSFIDO, see SBBSFIDO.DOC.
The following options are available from this menu:
System Address:
This is the default FidoNet address for sub-boards and the address
used for the sending and receiving of NetMail.
Default Origin Line:
This is the optional default origin line for sub-boards.
Semaphore File:
This is an optional semaphore file that will be signled upon the
creation of NetMail messages and EchoMail. If your front-end mailer
supports semaphores, this option should be set to the path and name
of the file that causes the mailer to re-scan the directories for
new NetMail or EchoMail messages.
EchoMail Base Directory:
This is the base directory for EchoMail sub-directories. If all of the
EchoMail sub-boards have an EchoMail path specified, this option is
not used. If one or more sub-boards do not have an EchoMail path
specified, their FidoNet messages will be stored in a sub-directory
off of this base directory with the internal code as the sub-directory
name.
NetMail Directory:
This is the directory where NetMail messages are exported to and
imported from.
Allow Sending of NetMail:
If you want to allow users of the BBS to send NetMail, set this option
to Yes.
Send NetMail Using Alias:
If NetMail should be sent using the user's Alias as the from name,
set this option to Yes. If this option is set to No, the user's
real name is used.
NetMail Defaults to Crash:
If NetMail should default to crash status (send immediately), set this
option to Yes.
NetMail Defaults to Hold:
If NetMail should be held until the sysop can review and authorize it
before it is sent, set this option to Yes.
Kill NetMail After Sent:
If NetMail messages should be deleted after they are successfully sent
out, set this option to Yes.
Cost to Send NetMail:
If you want the sending of NetMail to cost the user credits, set this
value to the amount of credits. Setting this value to 0, makes the
sending of NetMail free.
/* End of CONFIG.DOC */