ÞÛÛÝ° ÜÛÛÛÛÛÜ ÜÛÛÛÛÛÛ° ÛÛ° ÛÛ° ÜÛÛÛÛÛÛ° ÛÛ° ÛÛ° ÜÛÛÛÛÛÜ ÛÛ° ÛÛ°°°°° ÛÛÜÜÜÜ° ÛÛÛÜ ÛÛ° ÛÛÜÜÜÜ° ÛÛ° ÛÛ° ÛÛ°°°°° ÛÛ° ÛÛ° ÛÛßßßß° ÛÛßÛÛÛÛ° ÛÛßßßß° ÛÛ° Ü ÛÛ° ßÛÛÛÛÛÜ ÞÛÛÝ° ßÛÛÛÛÛß ßÛÛÛÛÛÛ° ÛÛ° ßÛÛ° ßÛÛÛÛÛÛ° ÛÛÜÛÛÛÜÛÛ° °°°°ÛÛ° ÛÛ° ÛÛ°°° ÛÛ°ÛÛ° ÛÛ° ÛÛ° ÛÛ°ÛÛ°° ßÛÛß ßÛÛß ßÛÛÛÛÛß ÞÝ° ÞÝ° ÞÝ°ÞÝ° ÞÝ° Þ° ÞÝ°ÞÝ° ÞÝ° Þ° ÞÝ°Þ° Ý° Þ° Ý° Þ° Ý° Þ° Þ° The Journal of IceNET January 1995 ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³The Editor's Desk ³ ³ The Upper Registers Will 1@6754 ³ ³ ³ ³Features ³ ³ The Search for the Perfect BBS Shaggie 1@2127 ³ ³ ³ ³WWIV Chronicles ³ ³ Linker and Linker Pro Hellfire 1@3600 ³ ³ ³ ³Hardware ³ ³ SCSI Trials and Travails Will 1@6754 ³ ³ ³ ³Software/Programming ³ ³ IBM OS/2 Warp v3 Update Will 1@6754 ³ ³ Hobbes OS/2 CD-ROM Mr. Jones 1@6281 ³ ³ ³ ³Light Bytes ³ ³ What's by YOUR Computer? William Reid 1@6027 WWIVnet ³ ³ ³ ³Special Feature ³ ³ The WWIVnet Technical ³ ³ Documentation (3/4) Midnight Tree Bandit 1@8411 ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ IceNEWS Staff For January 1995 ³ ³ ³ ³ "...Winners of the 1994 WWIVcon Award for Electronic News" ³ ³ ³ ³ IceNEWS Publisher - Jim 1@1 ³ ³ IceNEWS Editor-In-Chief - Will 1@6754 ³ ³ ³ ³ IceNEWS Contributing Editors ³ ³ WWIV-Specific - Spotnick 1@5497 Lite Bytes - Ima Moron 1@9661 ³ ³ Software - Music Man 1@9680 ³ ³ ³ ³ Editors-At-Large - Louie 2@7650 & Crave 1@7668 ³ ³ IceNEWS Production - Help Wanted ³ ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ ³ IceNEWS is always seeking submissions from those who have ³ ³ ideas for stories. If you have any ideas that you might ³ ³ like to see published, contact any IceNEWS editor or ³ ³ subscribe to IceNEWS Beat, subtype IceNEWS, host @1. ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ E D I T O R ' S D E S K ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ The Upper Registers ³ by Will 1@6754 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Across the nation, the Internet is killing BBSes. In areas where the local, community bulletin board used to flourish, only a few hardy survivors remain, eeking out an existance among those too poor to pay for regular access to the "Information Superhighway". (Yes, folks, I don't like that catchphrase any more than you do). This picture may sound a little drastic, and in a way it is - there are few areas where local BBSing has been totally killed. Virtually everywhere, however, has been hit to some degree. Boston is home to a plethora of Internet startups, all of which had made a dent in BBS usage. Usage on my system has dropping perhaps 20% in the past year, since the new ISPs came online, and many other small BBSes in Boston are experiencing much greater falloff. The only way I hold on is by offering a gigantic (3.1 gigabytes, 2.5 on Hard Disks) file area, something most systems can't afford to do. In more rural areas, this hasn't had a chance to happen yet, but it's spreading. If small, local BBSes can't manage to provide a new attraction for the majority of users, the slide will continue as Internet access gets easier and easier to obtain and use. Two years ago, it was a struggle to obtain an account - now you can go to the bookstore and buy a book with a month's free SLIP/PPP access. OS/2 Warp makes it even easier - click a button, answer a few simple questions, and you have the level of access that would take hours of fiddling, and a lot of money, before. Windows '95 will also have some TCP/IP connectivity built in (although not at the same level as OS/2 Warp - there won't be any integrated client programs besides simple text mode FTP and Telnet, and no default service provider). It'll all contribute. The local BBS isn't dead, but it might be gasping for air. With that out of the way, Happy Holidays and welcome to the January, 1995, edition of IceNEWS! Some more interesting stuff (as usual, I hope) for you in this issue - information from the author on Linker Pro, the Search for the Perfect BBS, my own trouble installing a new SCSI hard drive, and more. I'm sticking with a smaller format again, but I'd like comments from readers before making it permanent. I'd also like to extend the IceNEWS staff. First, I'm looking for someone who'd be interested in doing a regular opinion column similiar to my own, on subjects pertaining to the computer industry as a whole, or to BBSing in particular. We're still looking for a new Hardware/Operating Systems editor, as well as some freelance writers. If you're interested, please send me an email (1@6754 IceNET, 1@9351 WWIVnet, 1@1 ExpressNET). We published a copy of the Writers Guide a few months back, and you can also ask for a copy of it. ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ F E A T U R E S T O R I E S ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ The Search for the Perfect BBS ³ by Shaggie 1@2127 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ The Search The Search for that perfect BBS began with an Commodore Color 64 BBS package. I was thrilled with this BBS and learned how to be SysOp a good host. Still I found myself looking to the future searching for a higher goal where I could maximize the value of my System to it's fullest. I soon switched over to WWIV. I am like many bulletin board users and SysOp's where I harbor the dream of having a place in cyberspace given the opportunity to meet new people, to bring my vision and unique skills to the online community whatever they may be. I had to place aside any notion about running a BBS as being easy or a part-time endeavor. I found myself up late many nights configuring software, installing new games, fixing unexpected hardware failures or answering a mailbox stuffed with e-mail. I became prepared to come with inexpensive yet creativer ways to attract new users to my system with in time. I soon found the first and most important issue that a SysOp must face is defining her or his vision. Then to stay with it. After defining your vision and selecting the appropriate software you find your work has just begun! WWIV BBS is a fine and great BBS package with potential for the future with the five key features to look for in any BBS. Advanced file management supporting key word and description text search, multiple CD-ROM support and file area grouping. Messaging facilities with internet support, compatibility with offline mail readers, header search capabilities and handle alias support. Compatibility with external programs such as doors, database's, games, the number of online and offline utilities that will work with the software, the types of utilities available. Multi-node capacity and multitasker support which management facilities are provided. Real time conferencing, the ability to have multiple conference and private user to user on line contacts. Then the last thing to consider is the softwares performance with its architecture layout. WWIV is the perfect BBS. Did I really think this, no so still I felt that there must be one better. With the above there are still many other aspects that must be planned as you launch your BBS, example would be to marketing and advertising. Many SysOp's like myself don't always realize that it takes a long time to build a stable user base. I forgot to consider that I had all of the above and began my search once more for that perfect BBS Package. I was able to locate other packages such as Powerboard BBS, RoboBoard, Searchlight, Major, Synchronet BBS, VBBS, WildCat, PowerBBS and many more, Here I thought I would find that perfect BBS package! Each of these other software packages offer many of the same features as that of WWIV. One must kept this in mind. Now each of these BBS packages are very good and each has something to offer, So my search began with Powerboard that is ideal for novices, that this shareware program allows for quick installation and a fast menu developer. You can run multiple sessions from the same computer. It supports internet with a UUCP driver and lets you hook into standard electronic mail relays like Fidonet, QWK mail and PCrelay/postlink with support for Rip graphics. I was not happy with this BBS so I installed a test demo and soon a real working version of RoboBoard which is ideal for business boards as well for the general BBSs. Roboboards strongest feature is its graphical online interface. The software provides WYSIWYG, and yes I know, what the heck is WYSIWYG? Well WYSIWYG is What-you-see-is-what-you-get stands for WYSIWYG. With all of its pretty screens I still was not happy. Major BBS became my very next BBS, I said this one will be it, that perfect BBS package. I install a working version of Major which I found to support RIP graphics and could support 256 simultaneous users on one single computer and did everything that WWIV did. This is for me I said, I have that perfect BBS. No not really, I still was not happy and my search still continued on untill Searchlight came to my attention. Here I made that mistake of buying a version of Searchlight out of frustration with unlimited nodes. This I know will be that BBS package I want, that perfect System beyond a doubt. Again this was not fitting my Idea of that perfect BBS and so it sits in its box next to my computer. While WWIV is in command running on my Computer as it has been for the last ten years or more and if any SysOp was to give real thought they would find WWIV is perhaps the nearest to be perfect BBS package. I guess one might say I fell into that thinking of having pretty screens and little frills of fancy ornaments rather then having that perfect BBS which came to be WWIV. Yes, my search had ended with the finding of that perfect BBS package called WWIV. ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ W W I V C H R O N I C L E S ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³Linker and Linker Pro ³ by Hellfire 1@3600 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ I was asked to write an artical for IceNEWS after a popular discution had started up on the IceNET sysops sub about network1 preprocessors. Some of the features that I planed in Linker Pro caused a little bit of contraversy. The features include PGP on out-going mail Compression tests on all through packets Vebose Hub logs on all through packets File and linked packet checking Local striping capability. I guess at first people got a little scared about the stripping capability, but after clearing up the fact that it would only work locally a lot of the fears were dispelled. One thing that has come up recently is the ability of old versions of Stripit being able to work as a network1 preprocessor. Now that doesn't suprise me at all. People seem to think that the data format for packet scanning is some big secret and there has to be strict control over packet scanners. I have some information for people who think there has to be complete control. The WWIV packet format is no great secret and it doesn't take much effort at all to make a network1 preprocessor. The simple fact is that WWIV offers no security in it's packet format and to be truely secure people should start consintrating on sending stuff via direct connection. For those of you who are curious on how easy it is here is some code to get some of you started on your own packet scanning software. #include "net.h" // from WWIV source #include #include #include #include #include #include #include #include void anal(char *fn1) { FILE *in; char *pData; unsigned short *list; unsigned int i=0; net_header_rec nh; if ((in=fopen(fn1, "rb"))==NULL) { printf("ERROR: Opening file\n"); exit(1); } while(fread((void*)&nh, sizeof(net_header_rec), 1, in)) { i++; printf("\015Record #%u, Type=%u/%u ", i, nh.main_type,nh.minor _type); if (nh.list_len) { list=(unsigned short*)malloc(nh.list_len*sizeof(int)); //allocate List fread((void*)list, (long)nh.list_len*sizeof(int), 1, in); } pData=(char*)malloc(nh.length); //allocate buffer fread((void*)pData, nh.length, 1, in); // do what you need to here with the data that you have loaded free((void*)pData); // get rid of memory allocated here. free((void*)list); } fclose(in); // close file } void main(int argc, char *argv[]) { anal(argv[1]); } WWIV doesn't currently support direct connection but PGPing that Linker will offer is one solution to the security problem. PGP capability in WWIV packets is a whole new ball of wax, mainly because of the contriversy on WWIVLink about PGP. Linker Pro will allow people to send email in encrypted format AUTOMATICALY. Automatic security should be taken for granted and since we have not method of direct mail sending (which may be the next project I develop). Linker Pro v1.0 and Linker v3.7 will also append routing info and to all mail sent through Linker so that all packets can be tracked. The compression test is preformed on standard mail packets and systems may be exempted from the compression tests. Verbose hub logs consist of loged info on what data is being sent to system which direct connect with the system using Linker Pro (Another hot topic I am sure). The main purpose of Linker Pro is to allow the average sysops control of the data that goes through his system. The origonal Linker has gone as far as possable and now it's about time we had a network1 preprosessor with the flexability that WWIV sysops have been requesting for a long time. [Editor's Note : For those who are interested, a Direct Mail program for WWIV is under development by a third party, including Direct E-Mail and File Transfer characteristics. When development has progressed far enough, I hope to procure an article on the subject from the author.] ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ H A R D W A R E ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ SCSI Trials and Travails ³ By Will 1@6754 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ I was an early adopter of the SCSI standard (back around 1990, before IDE really took hold, and you could still find an MFM controller without too much trouble). SCSI looked promising then - you could link multiple peripherals onto one high speed board, and save yourself time, money, and expansion slots. Configuration wasn't any more difficult than anything else, at the time. Nearly five years later, SCSI (and SCSI-2) have done a pretty good job of living up to their early promise. Over the years I've invested quite a lot of money into SCSI peripherals, and I've been able to keep every one of them in service, and operating quickly. IDE (and more recently, Enhanced IDE) have taken some of the market away, but for large capacity drives, CD-ROMs (although there are a few EIDE models becoming available), and estoeric devices such as SyQuests, CD-Rs, Magento-Optical, and even digital cameras, SCSI still can't be beat. Of course, there are a few snags. When I bought the 486 I use to run the BBS (my main system) last year, I also bought a new VLB SCSI-2 adapter from BusLogic (by either luck or intelligence, I managed to avoid buying the UltraStor model before that company went under). The problem with this adapter was that it used a DB-50 SCSI-2 connector to hook up with external devices. Finding this cable took several months and ended up costing me over $50. Prices have since gone down, and availability gone up. And this month, when I obtained a new Seagate 2gigabyte SCSI-2 Hard Disk Drive. My existing Fujitsu 540 megabyte had filled up, and I had to resort to archiving BBS file areas on floppy disks. Since you can only have two hard disks in a PC without going through a lot of hassle, I wanted to get one that would take me through the rest of the operational life of this machine. However, when I installed the drive, all was not immediately perfect. There are a few steps to follow when installing a new SCSI hard drive (the one I was installing was configured to be the second drive in the system): 1. Before you open anything up, figure out what the appropriate SCSI ID is. If it's the first Hard Disk, it has to be 0. If it's the second, it has to be 1. These ID's are reserved. If it's another type of peripheral, find an ID in the upper ranges that isn't in use. 2. Look at the SCSI cable, and decide in which order you're going to end up linking the drives together in. SCSI device chains require a "Terminator" at the end of the chain (on the last device connected). On hard drives, this will consist of either a chip or package to insert or remove, or a jumper cable. Consult your drive manual. The terminating resistor is important, as without it the controller will send too much power through the chain, slowly cooking your electronics. 3. Make sure that the new hard drive is set correctly. This includes terminators, SCSI IDs, and anything else. Once you've done this (read any relevant manuals), you can actually install the drive. Make sure that the final device (and no other devices) are terminated, and that the ID's are set. Also check that Pin 1 on each drive is connected to the same side of the cable (you may need to twist it). SCSI cables usually have a red stripe down one side to show the location of Pin 1. Make absolutely sure that this is correct on all drives and on the controller. In theory, now, you should be able to turn the computer on, run FDISK, and partition drive two (if you've only got one drive, you need a DOS install/Boot disk, or OS/2 Install disks). And in fact, it usually works this way. Of course, I hadn't counted on Murphy's First Law of Computing - nothing ever works the first time. I opened the machine back up, checked all the connections, IDs, terminators, and cabling, and tried again. Murphy's Second Law of Computing bears a striking resemblance to his first. When something like this happens, and you know that your setup is correct, there are really two things you can suspect. The first is hardware failure, and this is not unlikely - in its FedEx facilitated rush from Arizona to Boston, the drive could concievably have broken something. I tested this by removing the older drive from the circuit (unhooked the cable), and setting my new drive as the final device, terminated, with SCSI ID 0, as if it were the only drive in the system. I put in my DOS 6.2 Install disk, turned on the computer, and waited. Needless to say, everything worked. The installer sat there for a while, formatting, and then I had a one-gig partition to use (without software/hardware tricks, DOS can only adress the first 1024 cylinders on a Hard Drive, or one gigabyte. In this case, the first gigabyte worth). Most SCSI cards (like mine) that are worth their salt have a DIP switch or other configuration item that will allow them to buffer int13h, and access larger amounts in DOS (mine will do eight gigabytes, if I flip the switch). Since I knew the hard disk was functional, the problem had to be an incompatibility between my old Fujitsu drive and the new Seagate. Sometimes, however, all that the incompatibilty does is prevent the new drive from being recognized unpartitioned/unformatted (and this indeed happened - there was no sign of the Seagate drive the first time around, from anything, including the OS/2 System Information Tool, and the boot up diagnostics). So I reset everything the way it had been at the start, and powered up the machine. Needless to say, it worked perfectly. I was then able to use the OS/2 FDISK utility to partition it into three chunks (with a large drive, I prefer the partitions), and format. OS/2 deals with using over cylinder 1024 with the High Performance File System, so I installed that and used it for the second two partitions. With the appropriate driver, you can also use FAT. SCSI configuration can be an excellent challenge, but it's fair to say that it's usually a little easier to deal with than this. ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ S O F T W A R E / P R O G R A M M I N G ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ IBM OS/2 Warp v3 Update ³ By Will 1@6754 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ Since our review of OS/2 Warp last issue, there have been several enhancements made to the product. First, IBM makes new versions of the TCP/IP related programs available free over the Internet. Since last month, three updates have been made: NewsReader/2 1.07 - A maintenance release with a few additional configuration features and usability upgrades. WebExplorer/2 0.95 - An upgrade of IBM's WorldWideWeb/Mosaic browser. Bug fixes, multithreading support (will load up to four images at a time), speed increases. Still lacks support for mailto: links, but it's coming. PPP Gamma - Update to the "Dial Other Internet Providers" application, now supporting the PPP protocol as well as SLIP, and offering several other nice features (for instance - a checkbox on the dialing screen that will dial "9" before the number - very usefull with laptops when you're plugging into different phone systems). Also, OS/2 Warp for the PowerPC entered Beta Testing on December 14, 1994, on schedule for the expected 1st half release date. The OS/2 Warp GA and LAN versions are also reported to be on schedule. ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ Hobbes OS/2 Archived CD-ROM ³ By Mr. Jones 1@6281 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ CD ROM Review : "Hobbes OS/2 Archived" (August 1994 edition) Publisher : Walnut Creek CDROM Reviewer : Mr. Jones - Freewheelin' BBS (612) 647-5841 E-mail : 1@6281 System Requirements: Obviously if you intend to use the programs on the CD you need OS/2 and a CD ROM drive. The CD may also be used with a BBS system running from DOS or OS/2 to make OS/2 files available to callers. Archives are mostly in ZIP form though some ZOO files do appear. Archivers are included on the CD and are automatically invoked by the menu shell when a file is selected. Review: Hobbes OS/2 is THE CD for OS/2 fans. This disc is updated quarterly. I owned the Feb, 94 edition before receiving the August version for this review. The CD is available as a subscription with quarterly updates direct from the publisher. Subscribers will pay the list price, so this is not necessarilty the most economical option, street prices run $5-7 lower. Like any shareware CD ROM, there is always the issue of current files. The lag time between program updates and CD publication can often mean a newer version of a program is released before the CD is in your hands. Being updated quarterly, Hobbes OS/2 does not fall victim to this nearly as often as many shareware CD ROM disks. The files on the CD are accessible via a menu shell executable from either DOS or OS/2. The CD is also BBS ready for sysops who would like to make this selection of OS/2 programs and files available on their BBS system. Over 3000 OS/2 files are on the CD. Files are broken down into sections on two levels. First, by the OS/2 version the program is written for, 1.x, 2.x, 2.1 or all. Within each of these sections files are grouped into topics such as games, graphics utilities, demos, programming, etc. The shell program allows you to navigate the directories on the CD quickly and easily, files are displayed by name and include a one line description via this menu shell. When the user finds a file of interest, simply highlighting it and hitting enter will extract the program into the directory of your choice. The directory structure of the CD makes sense, though it is a bit cumbersome if you need to navigate at the command line level. The basic directory layout is consistent from version to version, which as a sysop who had to manually install the directories to my BBS, made upgrading to the August release much easier. Of course, if you use a BBS system that has data files on the CD, or use a CD ROM door, this is probably not an issue. BBS ready files are included for RBBS, PCBoard, opus, Spitfire, Wildcat and Maximus with good multi-line descriptions. I found very rare cases where descriptions were missing. The most encouraging thing about the Hobbes CD is that they actually seem to keep current versions. Old versions of files were removed and replaced with new versions between the Feb and August issues. Some other nice aspects are included disk images for upgrading your OS/2 installation, for example 2.10 to 2.11. Lots of technical help files, and lots of files direct from IBM. This disk also includes files for programmers including full OS/2 implementations of GCC and EMX 08h C, GNU, EMACs, Ghostscript, and more. A good helping of games, icons, utilities and so on are also present in mass. If this CD is maintained in up-to-date-fashion we can expect that releases in the first quarter of 1995 should provide new material for OS/2 Warp. ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ L I T E B Y T E S ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ What's by YOUR Computer? ³ By William Reid 1@6027 WWIVnet ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ [Editor's Note - I had to cut this listing down to size, due to the truly stunning amount of response William Reid got on this. I found the cutting to be extremely painful - if yours isn't here, we may be forced to do a second installment] A while back I proposed a question on WWIVnet's National Sysop's Discussion. The question, was simply, "what is sitting around your computer". The response that I got was more than I expected. So, I decided to create this text file of the mail I received answering my question. I thought it was 'neat' to know what other sysops have lying around thier computers. Right now, looking around mine, there's two Labtec speakers, a phone, a bottle of olive oil (don't ask), a bottle of extra strength tylenol, an ashtray, an unpaid bill, several notebooks, and three pens. Below are the responses I got. ------------------------------------------------------------------------------ Okay, sounds fun (what's laying near the computer). Tolkien #1 @2000 Thu Nov 10 14:37:13 1994 Let's see: a TV Guide, a TurboPower upgrade/product-info form, a jar of silver change, a jar of pennies, 2 diskette boxes full of disks, 10 software packages, a briefcase, 5 library books, a screwdriver, two notebooks, a QuickTake camera box, an Insight Computers coffee mug, 50 back issues fo PC Mag and MacWorld, a USR Dual Standard box (no, make that two of them), yellow pages, white pages, a copy of American Photo, a computer toolkit, a LapLink parallel cable, and a leather jacket. Hmm, now you know a lot more about me than I would have expected . ------------------------------------------------------------------------------ My system Bob Marley #1 @11653 Thu Nov 10 17:53:45 1994 Here is what I have. I am in the second bedroom of a 2 bedroom apartment. I face out a window. Behind me is the spare full size bed. Behind that is a bookshelf. To my left is a dresser. To my right is a closet. The desk is a white ikea thing. Sorta like a piece of long flat wood on 2 legs. Simple. Left of the desk is a drawer thingy, broken, w/ my printer on top. I sit in a directors chair, on a plastic thing on the floor. The computer is a full size tower under the table on the left. The monitor is on the left of the desk. There is a tv guide here open to the 1/2 finished crossword puzzle. Tape measure on top of it. Seashell and wooden name thing on top of monitor. To right of monitor is a cd-holder w/ 3 cdroms, 2 carriages and my gf's picture on top. Then 2 computer books. 9 boxes of 5 1/4" disks along the back. Very dusty. a joystick on top of them. A clock radio, lamp, and pencil sharpener next to that. On top here I have scattered 3 1/2" disks, with their plastic covers everywhere.... pens, Halls original flavor 2 months old w/ 2 gone, 2 checkbooks, a pen, a calculator, a mouse a blimpie vip card, and some computer printouts of mods I took notes on... and a notebook I write .gif descriptions in....... and an envelope that meant to be sent 3 months ago w/ my id in it to a bbs..... That's it...... Oh and a 14.4 sportster behind my keyboard here... And a cat litterbox on the floor to my left...... stinky! ------------------------------------------------------------------------------ Okay.. this is fun. :) Quarth #1 @2136 Thu, Nov 10, 1994 - 4:57 pm ..I just cleaned up yesterday, so it isn't completely fair..but.. ..A monitor on a stack of 11 books. ..Tape backup to the right of it ..Modem to the right of that ..Two cheap speakers on either side of the monitor ..32 disks from the new OS/2 v3.0 ..DOS bootup disk on mouse pad ..Keyboard cover ..2 metal wrenches ..Misc screws, nuts, and bolts ..flourescent lamp ..computer books ..OS/2 book under and to the left of the computer ..tower case under, and to the right of the moniter ..keyboard on TV tray, shoved under table that holds up monitor ..two telephone books, a computer book, and a small white box on top of the ..computer tower case, on which the mouse pad rests ..pop can ..pen ..scratch paper ..watch ------------------------------------------------------------------------------ O.k.... Black Ninja #1 @2350 Thu Nov 10 12:56:15 1994 O.k., here it goes, around my system I have another 386 40mhz machine, a calculator, a stapler, joystick, speakers, a clock radio, a T.V., a fan, assorted pens, CD's, floppies, a desk light, a map of the U.S., various bills, a couple of fish tanks, a rabbit, 4 birds, printer, various doc's and 3 book cases full of books, garbage can and a telephone! I think that about covers it. ------------------------------------------------------------------------------ My computer... The Sysop Society #1 @2442 Fri Nov 11 15:25:17 1994 My computer shares it space with a HP Deskjet 500C printer, a mouse/and pad, 2 koss mini speakers, a paper clip dispenser, a high school telephone directory, even though I am not in high school, a bunch of disks, a deposit slip for the back, a letter holder with more disks in it, a cup for pens, with assorted computer diagnostic tools in it, 2 modems, and a high school history book (again, not in high school) and a star trek technical manual. Don't forget the 2 liter of Mountain Dew blocking my sight of the modem. ------------------------------------------------------------------------------ Funky question, but... Highwinder #1 @1283 Fri Nov 11 13:43:09 1994 Ok, here's my local mess: On my desk, sitting around is my ashtray, half a pack of generic cigarettes, a pile of blank 1.44's, my scanner, printer, Altec Lansing Speakers, my phone, another empty pack of smokes, a zippo lighter, a stack of about 25 CD's, my checkbook, a letter opener, and my Thrustmaster Flightstick and Thrustmaster weapons control system. Oh yeah, and a stapler. ------------------------------------------------------------------------------ Hehehe... good one, Will... Sandman #1 @14300 Pack of Marlboros, Half full ashtray, watch, Roll of toilet paper, my NRA sticker, a 20$ bill (THAT'S rare! ), motorcycle keys, calling card, 3 CD's, 2 music, 1 program, Clothespin, Resume, (looking for a job!), and a Readers' Digest Condensed book. Oh, Q-tips on top of my monitor. BIG computer desk. ------------------------------------------------------------------------------ around the desk Eric M. Hermes #1 @12058 Thu Nov 10 07:02:11 1994 well, let's see here..... I, too, have an unpaid bill here, lying on top of my external floppy disk drive (I run my bbs on a laptop, and it has an internal 1.44mg 3.5" drive, and an external 5.25" 1.2mg drive).....anyway, on with the list.... (besides my Canon BJ-200 printer and my modem) I have a small notepad with pen, a couple of receipts, an old velcro nametag from my Air Force days, 4 different business tags, a rejection letter from a job I applied for (oh well).... and a couple of miscellaneous pieces of paper, and a soda, and my watch. that's about it.... Oh yeah, this isn't on my desk, this is on my dresser, you know, the thing with the drawers full of clothes? :D Anyway, the dresser is what my system sits on, hehe.... ------------------------------------------------------------------------------ Items on the computer desk... Skycast #1 @2733 Fri Nov 11 17:30:56 1994 In reply to your inquiry about what items surround my computer...here goes. Sitting on the drafting table that holds my desk is a telephone, a bag full of dice (for AD&D and Car Wars), numerous in the works AD&D projects for my campaign, Roget's Thesaurus, an odd assortment of rubber bands and paper clips, various pens and pencils, many AD&D handbooks, and a stack of 3 1/2" disks. ------------------------------------------------------------------------------ Re: Allow me to interrupt... Sol #1 @14271 Fri Nov 11 10:15:08 1994 Hmmm... A Kenwood Steroe System, with two extra speakers... Several computer books, lots of 3.5" disks... A 27" Magnavox, with an RCA 4-head VCR. A hair pic next to a bottle of conditioner. A scanner that goes up to 950Mhz. Seveal issues of PC Magazine, all my CD's (both data and nusic), an empty bottle of 1Five Alive, Fruitopia Strawberry Passion Awareness, and Fruitopia 1Fruit Integration0, (mostly becuase I make the stuff at my work). A toothbrush, wallet, pinecomb from mountains 300 miles away...about 50 unpaid bills, two phones, one cordless.. a flashlight from TCI Cablevision with fiber-optic glass extending from the end of it...about 8 different keys...a few computer ads from the mail...instructon booklet for Under A Killing Moon {the new hit game from ACCESS that spans 4-CD-Rom's)...a hairnet, several pens...CD cleaner solution, a lava lamp...an immunization record card...mouse pad with Logi-tec mouse, Packared Bell Moniter... Guess thats it. I have a big desk. ------------------------------------------------------------------------------ My place. Philippe Sainte Marie #1 @20354 Sat Nov 12 11:15:01 1994 My computer's in my bedroom. The Keyboard is in the middle of a lot of junk. CD's (audio) piles around it. Modem's manual in front of the kb, serving as a mouse pad. Stereo system w/ mixer. Used socks around the chair (I wash only once in a week!). Piles of floppies (5 1/4" & 3 1/2"). Also, at one time, there was ANOTHER computer. An Apple //c. Wow. There's about 50$ worth of change. Too lazy to roll it. What else. Piles of paper. Hey, there's even a path to go to bed. Optionnaly, there's a carpet under that junk. I'm messy. ------------------------------------------------------------------------------ Survey...this oughtta be good... Cyberpunk #1 @4244 Fri Nov 11 12:48:28 1994 2 empty glasses 6 QIC tapes 50 floppies 2 modem manuals 1 5.25" floopy drive (bare) Assorted dice Assorted harcopies 1 external SCSI hard drive 1 joystick 1 IC puller 1 printer 2 letters from US Robotics 1 microphone 1 mouse & pad 1 screwdriver Assorted writing instruments 2 sets of keyboard-lock keys ------------------------------------------------------------------------------ BBS System... Rambo #1 @3000 Fri Nov 11 10:25:24 1994 Several unpaid bills. Stacks and Stacks of floppy disks and CDs A plate that needs to go in the dish washer fingernail clippers paperclip holder stapler two hard drives (Unk if they work) and a pair of dirty socks under the desk ------------------------------------------------------------------------------ Well, if you want a rundown... Wildfire #1 @9266 Sat Nov 12 09:34:22 1994 ...i'm assuming yu want what's on the desk, or in the direct vicinity of the computer, which would be the desk. Well, here goes... The tower case resides under the desk with the two power strips and the phone wiring, along with my paper bag I use for trash and yesterday's lunch which cosisted of a TV dinner, it's just the "plate" now. On the desk over the tower case is a ton of computer related printouts, a set of Radio Shack mini amplified speakers, a set of Radio Shack Pro-70 headphones, my Radio Shack two line phone, four stacks of 3.5" floppies, a disk case, the mouse, a roll of masking tape, then on top of the desk I have built shelves, (they sit over the monitor/hutch assy. On the first shelf is most pretinent, it's a ton of post-it note type things with names and numbers, my USR Sportster quick reference for basic troubleshooting, my Radio Shack answering machine, my far side calendar, my desk lamp, Boston electric pencil sharpener which makes the screen wobble when used, some floppy cables and misc. case parts, a box of clipper staples, a box of envelopes, and most important, a playing card thumbtacked to the front of the shelves, a Suicide King. Wow, what a useleess post, fun though. :) ------------------------------------------------------------------------------ laying around... Lachesis #1 @1638 Fri Nov 11 00:22:05 1994 Well, I have some mags (reference material for a post I was responding to); random phone numbers and other computing/bbs notes scribbled on scratch paper (can't make heads or tails of 'em, should throw 'em out, but I'm afraid I'll discover they were important, ); a battery dead watch (to let me know what time it isn't, ); a pencil; a stack of books (more reference material); bad disks (why don't I throw those out? Do I think they will magically get better?); some shoes (I keep my bbs computer in the closet); and a sleeping husband. ------------------------------------------------------------------------------ Hmm... Insane Depression #1 @9211 Fri Nov 11 12:53:57 1994 Sounds interesting.. okay, here goes mine: My system shares space with a caller ID box, my student ID, a wallet, a couple of phone bills (paid), scotch tape, stapler, a mouse trap, a desk lamp, an old bottle of white out, countless 5¬" disks, some wires, a ream or two of paper, catalogs, a bicycle light generator (in broken status), my admissions ticket to the SAT II test I took in June, and a calcualtor. ------------------------------------------------------------------------------ Area around the computer... Bill The Cat #1 @5182 Sun Nov 13 16:11:06 1994 Cluttering up my desk is my 5-disc rack CD system; color TV; lame 9-pin dot matrix printer; a shelf full of reference, instructional, and technical manuals; a stack of CDs; two lamps; two telephones; a pair of headphones; the modem; my cat (really); a calendar; my calculus homework; a typewriter; and a calculator (for the calculus, naturally. :) Oh.. the disks. Can't forget the disks. ------------------------------------------------------------------------------ The bbs surroundings.... Spacecase #2 @2140 Sun Nov 13 21:50:36 1994 Interesting concept. Well, let's see. The computer is on a cheapie kit desk, along with a box of kleenex, a used kleenex, a pile of paper for taking notes from email etc, and a flashlight. To my right is a desk chair with a broken back. To my left is the utility cart with laundry supplies, then the laundry machines (currently in use). A puddle of water from the washing machine overflow, a bucket, a plastic bag, the sewer stack, a garden hose, and the basement walkout screen door (removed a year ago to bring large items into the basement, never reinstalled). A bunch of tools, and an antifreeze jug with used motor oil in it. ------------------------------------------------------------------------------ Laying around the desk Daydreamer #2 @2491 7[1Keeper of Dreams7]0 Thu Nov 10 07:15:47 1994 I think you have a new idea for what to do when there is nothing to do. On this desk there are at least 72 floppies, 3 tape boxes, I dolphin, a champange glass with DEAD flowers from my sweetie < they were not dead when I got it> a pencil holder ,holding a screwdriver < the pencils just lie on the desk>, three note pads, an address book, 2 CD's tittle to the car various instruction manuals , a few miles < marlboro miles that is> the bonus certificate from sears, one chip puller, an easter bunny candy basket, 4 candles < of course that lighter and cigarettes and a couple of books of matches for back up> AND "My Coffee Cup" plus various other sundry things. like the emory board, a couple of packets of sweet&low and 27 different phone numbers on little pieces of paper that I can never call or throw away, because if they were important enough to write down they musst be kept. ------------------------------------------------------------------------------ whats on your bbs desk? King Lerxt #1 @3810 Sat Nov 12 16:18:36 1994 Great question! Here is my list: 1) My BBS System 2) 2 speakers 3) Modem (external) 4) Lamp 5) floppy discs 6) Screwdrivers 7) pens and pencils 8) medicine 9) Scissors 10) walkman 11) a HUGE PILE of paper notes that I generate every time i sit down and start reading stuff on the bbses and subs 12) lots of dust! :( its a mess and it always gets out of hand ------------------------------------------------------------------------------ On my table John Rogers #1 @7202 Sun Nov 13 16:08:36 1994 On the table with my system is mostly a bunch of books. Windows manual, procomm manual, my modem manual etc... I have a mouse and mouse pad. a cup with pens, two phones (one voice and one data) 3 and 5 inch floppies, post it pads, and a lot of scribbled on bits of paper. Oh, and a lamp. ------------------------------------------------------------------------------ Well, As you may know... Skeeve #1 @9263 Wed Nov 16 18:13:41 1994 What the BBS sits on is actually the file extention of my desk, and it sits directly over the top of the files, so that I can't get at them... On the file stand (which is free standing of the actual desk, wherein resides my "play" computer) ther is alos an amplifyer that is used for the "play" computer, stacks of books atop that (Dictionary, the Book of Massage, MS-DOS advanced (Yea, right) applications, various modem, and hardware configuation infolets, a windows manual (Still shrink wrapped..) a digital clock, some blank stock disks, Watches (By Dean R. Koontz... great read...) The amplifyer is stitting on an old XT case (Long since gutted, and now holds paper stock for my printer inside the drivebays, as well as the amplifyer on top..) Next to the stand is a box with an adaptec SCSI controller card, and my old briefcase, and an old calandar with Patrick Nalgel prints... under is a BIG of O' parts... If I ever need a part, I simply dig thru it, and I probably have it in there... That about sums up the computers enviroment... ------------------------------------------------------------------------------ My system clutter Glass Tiger #1 @14281 Tue Nov 15 11:37:05 1994 Well here's what's around me. I have pictures that my 5 year old drew on the wall, I have my power surge protector (the kind your monitor stands on) standing up against the wall (my 1.5 year old has turned the computer off too many times). I have 2 phones (voice, bbs), a really dusty lamp, scotch tape, mouse pad, spare change everywhere, disk labels, unpaid bills, post it notes, pamphlets for my daughters school, pens, my tower (and the printer that is on top of the tower), the catfood/water on the shelf under the table top, and 3 REALLY CLUTTERED JUNK DRAWERS. Is this sufficient? :) In short, it's your typical desk with a computer on a table that is about 4' long and 2' deep. ------------------------------------------------------------------------------ What is surrounding my computer... -=<< Doc >>=- #2 @5071 Sat Nov 19 21:51:54 1994 Far too much to list, actually...well, there is a half plentypak of Doublement, numerous bits of paper with notes on them, a 1/4" nutdriver, my other glasses, teh TV remote control, books on animals for reference in running Pet Net, my empty coffee cup that I wish would fill itself...of course it would have to make the coffee first cause I'm out. ------------------------------------------------------------------------------ Stuff Laying Around My System Will #1 @9351 Sun Nov 20 21:09:12 1994 Not much non computer stuff on my BBS computer desk (a bottle of nasal spray, since I have a bad cold, a bottle cap, two bookends, and a train pass) but my other computer desk (with a Silicon Graphics) is cluttered. Here's the list: 1. Necktie. 2. Keys 3. Wallet 4. Hankerchief 5. $2 bill 6. Ruler 7. Unpaid Internet Access bill 8. Stapler 9. Novel 10. Photos from a trip to Russia I made last year 11. Paper Clips 12. Pens 13. Book display 14. Empty Brushed-Steel picture frame 15. PC Magazine 16. Stack of QIC tapes 17. CD-ROMs 18. Passport ------------------------------------------------------------------------------ ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ WWIVnet Technical Docs ³ by Midnight Tree Bandit 1@8411 ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÁÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ [IceNEWS Serialization Note - This is part three of four. Internal page numbers have been retained for ease of reference. Page breaks, however, have been removed.] V. BBSLIST/CONNECT FILES AND MESSAGE ROUTING So how does the network software know where to send an off-system message, especially if the BBS has more than one connect? FidoNet has its nodelists, and so does WWIVnet. WWIVnet actually has two different types of node lists, as mentioned elsewhere. We'll take these separately, then discuss figuring out the routing. A. Old WWIVnet -- BBSLIST.NET & CONNECT.NET In the beginning of WWIVnet, there were only two files needed to keep up with the systems in the network -- BBSLIST.NET and CONNECT.NET. Though this is rarely used now, there are still some smaller networks which use these files, so they should be discussed. BBSLIST.NET holds a listing of what systems are in the network. Each system has an entry, with the systems usually grouped by area code. The format for each system's line: system number (preceded by @), system phone number (preceded by *), max bps rate of the system (preceded by #), system flags if any, WWIV registration number or date of entry (enclosed in brackets), and system name (enclosed in ""). For example, the BBSLIST line for Amber in WWIVnet could be: @1 *310-798-9993 #14400 < !$ [1] "Amber" Most of the system flags after the modem speed indicate the kind of high-speed modem being used by the system. Currently, these flags are: | -- Telebit-compatible (PEP) modem. < -- USR HST 9600+bps modem. > -- Hayes V-Series compatible 9600+bps modem. Z -- Zoom V.32terbo (19.2kpbs) modem. / -- CompuCom 9600+bps modem. ! -- CCITT V.32 (9600bps) modem. $ -- CCITT V.32bis (14.4kbps) modem. ~ -- V.FAST (28.8kbps) modem. ? -- Fax-capable modem (not currently used) Other system flags used which are not modem designators: + -- The system is a dedicated mail server. That is, it is not a true BBS, only handles the transfer of network mail for an area or region. \ -- Fidonet system. Some systems in the network have "gateways" into Fidonet (or Fidonet compatible, such as GlobalNet). = -- PCPursuitable system. This is actually not useful since PCPursuit has gone out of business (though there are other similar networks still operating). [IceNEWS Editor's Note: PC Pursuit did not go out of business. Sprint, the parent company, simply elected not to offer the servive any longer] _ -- End node. That is, a system with only one connection. There can also be one of three flags appearing before the phone number: ^ -- Area Code coordinator (AC). & -- Network Coordinator (NC). % -- Group Coordinator (GC) Note that since there can only be one Network Coordinator, the "&" should only appear once in the BBSLIST.NET file. Also, the "%" is not likely to be seen except in the Group setup described below, since this setup has no Groups. The first line of the BBSLIST.NET must be a tilde (~) followed by the Unix timestamp (seconds since midnight, Jan 1, 1970) indicating the date and time the file was sent out by the NC or GC. CONNECT.NET lists the connection costs between systems. The cost listed should be the cost per minute, though for most networks using this system, the rule of thumb is 0.00 for local connects, 0.01 for long distance connects, and more for long distance connects that one wants to route less mail through. Each entry in the CONNECT.NET file specifies a one-way connection between two systems. The entries in the CONNECT.NET file do NOT need to be in any specific order. The format for system's connection entry is: the system number (preceded by "@"), first connection and cost (separated by "="), second connection and cost, and so forth. Like BBSLIST.NET, the first line is a tilde (~) followed by the UNIX timestamp. Examples: 1. If there are two systems, numbered 1 and 2, and each can call each other for free, the CONNECT.NET file would look like: @1 2=0.00 @2 1=0.00 Note that the routing analysis software should make sure both ends of the connection have entries referring to each other. 2. If there are three systems, each can call the others for free, the CONNECT.NET file would look like: @1 2=0.00 3=0.00 @2 1=0.00 3=0.00 @3 1=0.00 2=0.00 3. If system 3 called the other two for $0.10, the CONNECT.NET file would look like: @1 2=0.00 3=0.10 @2 1=0.00 3=0.10 @3 1=0.10 2=0.10 In both BBSLIST.NET and CONNECT.NET file, each entry begins with identifying the system number (preceded with @), allowing system entries to take up more than one line -- in larger networks a CONNECT.NET entry can fill more than one line. Everything after the system number identifier up to the next "@", corresponds to that system. Thus, the CONNECT.NET files above could also be listed as: @1 2=0.00 3=0.10 @2 1=0.00 3=0.10 @3 1=0.10 2=0.10 or @1 2=0.00 3=0.10 @2 1=0.00 2=0.10 @3 1=0.10 2=0.10 Thus, the end-of-line indicator (EOL) should be IGNORED. Neither the BBSLIST.NET nor CONNECT.NET file need to be in any specific order. There cannot, however, be multiple entries per system in either BBSLIST.NET or CONNECT.NET. It is possible for a system to have references in one or both of the .NET files, but not be reachable from any other system. For example, two systems may be listed in BBSLIST.NET, and listed in CONNECT.NET, but each can only call the other. No other system in the network can connect with them, so they don't exist, essentially. Also, a system can be listed in BBSLIST.NET, but not have any entries in CONNECT.NET. This usually happens for systems just joining the network, and those systems essentially don't exist either. It is also possible for one system to call another, but the second system can't call back the first. This is unusual, but valid. Also, the cost of a connection can be different in one direction than it is in the other. This is also valid. BBSLIST.NET is received across the network as main_type 1, minor_type 1 (1/1). CONNECT.NET is received as main_type 1, minor_type 2 (1/2). B. New WWIVnet -- BBSLIST.x and CONNECT.x As mentioned previously, things changed in 1990. The original WWIVnet network had grown so large that it was necessary to break the BBSLIST and CONNECT files into smaller segments, known as Groups. How the Groups are determined is up to the Network Coordinator. WWIVnet's Groups were formed based on the connec- tion topology at the time of the conversion to the Group system. Many other networks use the International Time Zones to divide the groups. The Groups are numbered, with the potential for up to 255 Groups in a network. The BBSLIST and CONNECT files have the Group number ("x") as the extension. The BBSLIST.x file is formatted the same way as the BBSLIST.NET under the old WWIVnet system. Only BBSes with the Group are in each Group's files. There is an additional file, BBSLIST.0, which contains information for the routing analyzer. The first line has the UNIX timestamp, as usual. The second describes which CONNECT.x file to use. If it is ":" alone, then CONNECT.0 contains all the connection information for the network, so that is all that will be used. If the second line is ":A", then CONNECT.0 and the CONNECT.x files for all Groups are used. There can also be partial BBSLIST updates sent out, indicating systems to be added, changed or removed. The extension on these messages is generally Group number plus 512 (e.g., a group 1 partial update would be BBSLIST.513). For added or changed systems, the system is listed as it would appear in the BBSLIST.x it belongs to. A deleted system is listed as just the system number with a period (.), as in "@1234 .". These partial updates are incorporated into the full BBSLIST files during the routing analysis (see below). The BBSLIST.x files use the same indicators as the BBSLIST.NET file, with one addition: This should only appear once in each BBSLIST.x file, since each Group may only have one GC. CONNECT.x is not like the old CONNECT.NET. The main difference is that there are no costs in the connections, only the node numbers each system is connected to. So in the second example in the previous section, the CONNECT.x for systems 1, 2 and 3 would look like this: @1 2 3 @2 1 3 @3 1 2 As noted above, the CONNECT.x files will be used as specified by the second line in BBSLIST.0. When that line is ":", CONNECT.0 will contain all the network's connections. When it is ":A", the CONNECT.x files contain all the connections within each Group. All connections between systems in different groups are listed in CONNECT.0. For example, say we have a network with five systems, numbered 1, 2, 3, 4, and 5. Systems 1 and 2 are in Group 1, and systems 3, 4, and 5 are in Group 2. 1 and 2 connect to each other, and 2 connects to 4. 3 and 4 connect to each other, and 5 connects to 1. CONNECT.1 will contain: @1 2 @2 1 CONNECT.2 will contain: @3 4 @4 3 CONNECT.0 will contain: @1 5 @2 4 @4 2 @5 1 Like the old WWIVnet files, the ordering of the systems in these files does not matter, however a node number may appear only once in all of the BBSLIST.x files combined. The BBSLIST.x files are received across the networks as main_type 11, with the minor_type being determined by the Group they are for. CONNECT.x files are received as main_type 12, with the minor_type determined by the Group number. C. Figuring the Routing There are three ways message routing could be determined: 1. Each time you need to route a message, find the least cost or shortest path (depending on whether new or old update files are being used); 2. Each time one of the network programs that has to route messages is run, the least-cost or shortest route to each system is decided; or 3. Each time an update to the .NET files is received, the least cost route is decided to each system. Options 1 and 2 are simply not practical. Depending on network size and system speed, it can take a minute or more to analyze the network data files and determine the optimal route. Finding the best route to a specific system requires the same operation as finding the best route to all systems, so option #1 is a waste of time (besides possibly requiring the BBS to have the path- finding code in it). Option #2 holds no advantages over option #3 because it will tie up the BBS unnecessarily. Therefore, the optimal routes to all the systems in the network should be analyzed only when a network update is received. This routing analysis can be done any way, as long as it determines the best route. The best way, however, could follow these steps: 1. System records are read into an array from BBSLIST.NET (for the old WWIVnet setup) or the BBSLIST.x files (for the Group setup). The array is of struct net_system_list_rec (see below). All fields are filled from the BBSLIST.x except numhops and forsys, which are set to 65535 and 0, respec- tively. For the Group setup, the BBSLIST.xxx partial updates (.513-.768) are read in next, and the indicated changes (existing systems replaced, new systems added, systems indicated with "." deleted) are made in the array and in the BBSLIST files themselves. After processing, the partial updates are deleted. 2. Next, the CONNECT files are read into another array. Since system records may be repeated in the CONNECT files, make sure, when each system record is read in, a check is made in the array to see if there is already an entry for it. If there is, add the connections in the new record to the existing record. 3. Then, the analysis starts. The analyzer uses the system's callout list (CALLOUT.NET for NETxx) as a base, starting with the first entry and checking each of its connnects, spreading out from there to THEIR connects. This is done for each system in the callout list. For each destination system checked, the number of hops found is compared to that entered in the network data array (numhops) and changed if it is less. The forsys is also changed, if that is different. This is for the Group setup. If the network is using the old WWIVnet setup, cost, rather than number of hops, is considered. In this case, when figuring cost, the speed of a connection (highest speed two connecting systems will support) needs to be considered. For instance, two systems connecting at 14400bps at a cost of 0.10 would take precedence over two systems connectiung at 2400bps at a cost of 0.10 (assuming that they are on the path to the same destination system, and all other scosts are equal). 4. When all systems in the callout list are processed, analysis is complete and the network data array is written to disk. If specified, a piece of mail is then sent to the sysop giving the results of the analysis (for instance, how many valid systems are in the network, how many systems route through each of this system's connections, who the NC and GC and AC are, and so forth). The data structure NETxx's NETWORK3.EXE uses for the network data file is: typedef struct { unsigned short sysnum; /* system number */ char phone[13], /* phone number of system */ name[40]; /* name of system */ unsigned char group; /* group system is in */ unsigned short speed, /* max bps rate of system */ other, /* other info (bit mapped) */ forsys; /* next hop from here */ short numhops; /* how far to get there */ union { unsigned short rout_fact; /* routing factor */ float cost; /* cost factor */ long temp; /* temporary variable */ } xx; } net_system_list_rec; It is encouraged that this structure be used by any WWIVnet compatible analyzer. Not only is this used by the WWIV BBS software, but some WWIVnet add-ons also use this file, so supporting this structure will enhance compatibility with WWIVnet. The fields: sysnum, phone, name, group, and speed should be self-explanatory. other -- This is bitmapped, and contains the modem and other information shown in BBSLIST. The bitmap values are (with corresponding BBSLIST flag): \ other_fido 0x0001 | other_Telebit_19200 0x0002 < other_USR_9600 0x0004 > other_Hayes_9600 0x0008 ^ other_coordinator 0x0010 (area coordinator) ! other_V32 0x0020 $ other_V32bis 0x0040 = other_PCP 0x0080 % other_group_coord 0x0100 & other_net_coord 0x0200 / other_compucom 0x0400 + other_net_server 0x0800 ? other_FAX 0x1000 _ other_end_system 0x2000 ~ other_VFAST 0x4000 forsys -- Where to forward messages destined for this system, also known as "next hop". For example, if a message going from system 1 to system 5 passes through systems 2 and 4, then forsys==2. When it is determined that the system is unreachable (listed in BBSLIST but no connections listed), forsys==65535. rout_fact -- This is the routing factor, but is currently not used by the NETxx software. cost -- When using an old-style WWIV network setup, this holds the cost of the call, calculated as the sum of costs for each hop to the destination. When all systems have been processed, you should have a database containing all systems in the network and how they may be reached. Whenever a packet that is not destined for the local system is processed, the data file is searched to find the system entry for the destination system. If it is not found, then the system is unknown. If the system is identified as unreachable (forsys==65535), the system is also considered unknown. VI. TIPS FOR WRITING WWIVNET SOFTWARE That about covers all the technical details for designing software compatible with WWIV networks. Now for some things to consider for those wishing to design a WWIVnet interface for a non-WWIV BBS, or add-ons to existing WWIVnet software. A. WWIVnet Interface Software The information provided in this document is enough for anyone wishing to write WWIVnet interface software from scratch. Unless you are writing for a BBS on a non-PC platform (such as Hermes for Macintosh), there is no need to rewrite all of the software to interface a PC-based BBS to a WWIV network. Since the local mail processor (NETWORK2.EXE) is the only program that writes to BBS message bases, that is really the only one needing replace- ment. If any of the NETxx programs are used, it is essential that all of the supporting data files used by that software be present. For details on those files, see the WWIVnet software documentation. Some additional programming may be necessary, though. For one, a shell would be useful for executing the various network programs, unless the BBS can be modified to make the calls itself. A batch file could do it, but a program such as Jim Wire's CLOUT makes it much easier. Any shell or BBS modification should follow these steps (filenames in parentheses are programs from NET34 or files created/used by them): 1. Choose a system to call (or have one specified), then execute the network callout program (NETWORK.EXE). If successful, proceed to step 2. If not, either try again or end processing. 2. Check for the incoming netmail file (P*.NET). If there isn't one, end processing. If there is one, run the netmail packet analyzer (NETWORK1.EXE). 3. Check for the local mail file packet (LOCAL.NET). If there is none, end processing. If there is one, run the local mail packet analyzer (NETWORK2.EXE). 4. Check again for a netmail packet (outgoing messages result- ing from local mail processing). If there is one run the netmail analyzer, otherwise proceed to the next step. 5. Check for a BBSLIST or CONNECT update. The most reliable way to do this is to compare the filedates of the CONNECT and BBSLIST files against the filedate of the database file created last time the routing analyzer ran. If one or more of the files is new (or there is a partial BBSLIST update), run the routing analyzer (NETWORK3.EXE). If the software cannot be modified to handle these steps, it is probably best to use a front-end such as Front Door or Binkleyterm, then set up events that would run the shell for making the network calls and processing. The trickiest part is exporting messages from the BBS to a WWIV network file. Possibly the easiest way to pack new messages is to have the BBS write them out to Fido packets (if the BBS is Fido-compatible), then when control returns to the front end, run an event that converts the Fido packet to a WWIV mail file. When doing this, keep in mind that WWIV networks do not have all of the fields a WWIV packet does, most notably the "To:" field. Another method could be a program that, after the BBS returns control to the front end, scans the BBS's message bases for new messages on the WWIVnet subboards. This would work best for BBS programs that cannot export Fido messages. In either case, it is important that the netmail file processor analyze the outgoing message file (P*.NET) for tossing into the various connection files (S*.NET and Z*.NET). Of course, the optimal solution, if possible, would be to modify the BBS software to export the messages directly into a WWIVnet compatible mail file, and run the other network programs as needed without the shell. This is probably be a good time to discuss the naming of the incoming and pending netmail files, mentioned in step 2 above. The actual name of the P*.NET can vary, depending on NETxx version and what program generates it. NETWORK.EXE in older NETxx versions (NET33 and below) receive the netmail file as P1.NET, while the one in NET34 receives the file as P1-0-1.NET. The "-0" in the middle indicates that NETWORK.EXE created the file (think of it as NETWORK0). When other NET34 programs generate pending netmail files, the middle number indicates which program created it (NETWORK2.EXE, the local mail processor, would create a pending netmail file named P1-2-1.NET). The main reason for this new naming system is so that we can tell the source of a P*.NET file being processed by the netmail analyzer. The WWIV BBS just creates P0.NET (network email, generally) and P1.NET (outggoing sub posts, generally). WWIV 4.23 also creates a PGATE.NET file, which contains posts for "gated" subs (that is, subs which are carried on more than one network). WWIV 4.24 does not use PGATE.NET for gated messages. Multi-instance WWIV 4.23 and above setups create P*.nnn (where 'nnn' is the instance number, such as P*.001 for instance 1) while a user is online, but they are renamed to P*.NET after the user logs off. The NETWORK1.EXE processes all of the P*.NET files, until none are left, before converting any indicated S.NET files into compressed Z.NET files (see Appendix A). It is important that an alternate netmail file analyzer be able to recognize and handle any P*.NET file, not just Pn.NET. B. WWIVnet Software Add-ons There are two possible types of add-ons supported by the WWIVnet software, both working with the local mail processor. The external message processors (or "post-processors") are described above in the main_type descriptions. As noted above, it is recommended that any post-processor be written to be compatible with main_type 27, because it provides an easier interface for external messages. Again, a full description of how to use the external message feature is provided in the WWIVnet Software Documentation written by Filo. A common use for external messages is what is known as a "ping," used by the authors of some WWIV network utilities who wish to gain some information about the use of their software. The author sends out a main_type 27 message with the minor_type they are using. If a receiving system is using the software and it is installed properly, it will execute after local mail processing, and process the request in the external message. The local mail processor also supports use of "pre-processors," generally used to scan the local mail file for certain types of messages before the local mail processor gets to it. One example is JAFO's AUTOSEND, which looks for sub requests and sends out messages from the system's subs to new subscribers. These, also, are described in the WWIVnet Software Documentation. Naturally, any external message processor or preprocessor that generates new outgoing network messages must put them into a P*.NET file so that NETWORK1.EXE can find it and process it. APPENDIX A MAIL PACKET COMPRESSION In order to write WWIVnet software that can deal with compressed mail packets, you must have the PKWare Compression Libraries, available from PKWare, Inc. for $300.00. This Appendix covers the necessary details for handling compressed mail packets. To make the explanation easier, how NETWORK1 from NET34 handles compressed files will be explained. When NETWORK1 analyzes the file of messages to go out on the network (P*.NET), they are placed in Sxxxx.NET files (where xxxx corresponds to the numbers of systems in the CALLOUT.NET). After processing of all P*.NET files, NETWORK1 checks to see which connections accept compressed files. For each that does, its Sxxxx.NET is compressed with the implode() function from the PKWare libraries. The compressed data is appended to the corresponding Zxxxx.NET file (which is created if it does not exist). The size of the compressed segment in Zxxxx.NET is then checked against the size of the Sxxxx file. If the compressed segment is smaller than the original file, the file header and segment header (see below) are updated and Zxxxx.NET is closed. If the compressed file is the same size or larger than the uncompressed file, the uncompressed version is appended to the Zxxxx.NET (overwrit- ing the compressed version), then the headers are updated and the file closed. Whether the original Sxxxx.NET was compressed or not, it is deleted after it is transferred to the Zxxxx.NET. Thus, while an uncompressed netmail file is simply a collection of message packets with their headers, the compressed netmail file is a collection of segments which contain one or more messages, either compressed or not. The file has a ten byte header, and each segment within the file has a five byte header. The netmail file header has three elements: compression identifier -- long int (4 bytes) Always set to 0xfffefffe. extra bytes -- unsigned short int (2 bytes) Number of additional bytes in the header record, being the sum of the bytes in all fields following . This is to allow for future expansion of the header while maintaining compatibility with older versions of the NETxx software. Currently, this should have the value of 4. uncompressed bytes -- long int (4 bytes) Length of the file when it is uncompressed. This gets updated each time a new segment is added to the compressed file. The header on each segment of the compressed file has two elements: compression flag -- char (1 byte) Set to 0 if segment is NOT compressed, 1 if it is. segment length -- long int (4 bytes) Set to the actual length of the segment, in bytes. When a netmail file is received, NETWORK1 reads the first four bytes. If they are 0xfffefffe, it knows the file is compressed, so it decompresses it before processing the messages. The first ten bytes are read in order to get the uncompressed length of the file. Then for each segment, these steps are followed: 1. The segment header is read in, to see if the segment is com- pressed and how long the segment is. 2. If the segment is compressed, it is decompressed into a temporary netmail file (which is created for the first segment, and appended for each additional segment) using PKWare's 'explode()' function. If it is NOT compressed, it is written directly to the temporary netmail file. Once all segments have been decompressed or written to the temporary netmail file, the original netmail file is deleted and the temporary netmail file is renamed to the original's name. NETWORK1 then processes message packets the new uncompressed netmail file. [Conclusion Next Issue] ÄÄÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÄÄ ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ¿ ³ IceNEWS is an independent journal published monthly as a service to ³ ³ IceNET, its Sysops and users. The opinions & reviews expressed herein ³ ³ are the expressed views of the respective writers. All Rights Reserved.³ ³ Many product names used herein are the property of their respective ³ ³ manufacturers/authors. ³ ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ