========================================================================

                             The  $ R / O

                          R E A D   O N L Y


                     -=( February 1987 Issue )=-



The  monthly news magazine of the Tampa Bay Kaypro User's Group and  the
                      DataCOM Super Systems(tm)

========================================================================
News  and reviews of programs,  hardware,  and peripherals for users  of
microcomputers with CP/M,   MP/M,   MS-DOS,   PC-DOS, or TurboDOS multi-
user operating systems.
========================================================================

                  Steven L. Sanders - Editor (Sysop)

========================================================================

The  DataCOM Super Systems(tm) is a "state of the art" multi-user remote
database system  with a total of 150mb of online  files.   An annual fee
of  $40.00 is required  for access,   an application may  be  downloaded
while online,  modem users call (813)  791-1454 300/1200/2400  baud,  or
contact us by mail at:

                    The DataCOM Super Systems(tm)
                         2643 Cedarview Court
                      Clearwater, Florida 33519


                         -==( DISCLAIMER )==-

Articles and reviews of microcomputers,   hardware,  software, and other
peripherals  reflect  currently  advertised prices as released  by   the
distributors  and are included here for  YOUR  INFORMATION  ONLY.    The
TBKUG/DataCOM  Super  Systems(tm) is  NOT  being  paid  to     advertise
these   products  and  we   cannot    be    held accountable   for   the
actual retail price  and/or   performance of  said products.


                -={ Distribution/Copyright Notice }=-

This magazine and its articles may be freely distributed on other remote
systems  as  long as this title page  and  all  copyright notices remain
intact.  We readily accept material submitted from outside  sources  for
inclusion in  future  issues  (subject  to editorial review of course.)




       THE PERSONAL COMPUTER AWARENESS DICTIONARY FOR BEGINNERS

   Do   you  feel  confused  by the jargon of  the  personal   computer
revolution?    Afraid  to enter the world of the computer   salesmen  to
browse  because you don't understand their  language?    Well, here's  a
quick  lesson  on just what some of those  slick  phrases  you've  heard
REALLY mean!

    IBM-COMPATIBLE:   usually not IBM-compatible at all and runs MS-DOS
v1.25 on a very strange disk format

    FULLY  IBM-COMPATIBLE:   somewhat IBM-compatible,   but  won't  run
BASICA without hanging the machine

    100%  IBM-COMPATIBLE:   compatible  with  most   available hardware
and software,   but not with the blockbusters IBM always introduces  the
day after tomorrow

    LAP-TOP:  smaller and lighter than the average secretary

    PORTABLE:  smaller and lighter than the average  refrigerator

    TRANSPORTABLE:  neither chained to a wall nor attached to  an alarm
system, roller dolly is optional

    HARD  DISK:   a  device  that allows naive users  to  delete   vast
amounts of data with very simple commands

    MOUSE:  a peripheral originally named "vermiform  appendix" because
of its functional resemblance,  renamed for its usefulness only as a cat
toy

    PRINTER:  an electromechanical paper-shredding device

    MODEM:   a  peripheral used in the unsucessful attempts to  get two
computers to communicate with each other

    NETWORK:  an  electronic  means of allowing  more  than  one person
at a time to corrupt, trash, or otherwise cause permanent damage to very
important data

    DOCUMENTATION:   a  perplexing  linen-bound accessory  resorted  to
only   in   situations of dire need when   friends,  dealers,  and  user
groups are   unavailable,   normally  employed  only  as  a   decorative
bookend

    USER-FRIENDLY:  supplied with a full-color manual

    VERY  USER-FRIENDLY:   supplied  with  an  on-disk  and   audiotape
tutorial,   so   the   user   need not  bother   with   the   full-color
manual

    EXTREMELY  USER-FRIENDLY:   comes  with a mouse so that   the  user
need not bother with the on-disk  and/or  audiotape tutorials, the full-
color manual, or the program itself

    EASY TO LEARN:  hard to use

    POWERFUL:  hard to learn and use

    MENU-DRIVEN:  easy to learn

    COPY-PROTECTED:
         (1)  a clever method of preventing incompetent  pirates
              from  STEALING software  and legitimate  customers
              from USING it.
         (2)  a   means  of  distinguishing honest   users  from
              theives by preventing  larceny  by the former  but
              not the latter.

    VERSION 1.1:   eats data only occasionally,  upgrades free to avoid
litigation by disgruntled users of version 1.0

    VERSION 2.0:   the version originally planned as the  first release
[execept  for  a couple of data-eating  bugs  that  just won't  seem  to
go  away],  no  free  upgrades  or  the  company would go bankrupt

    VERSION   3.0:   the revision in the works when  the  company  goes
bankrupt

    STANDARD:  similar to something else on the market

    BACKUP:    the   duplicate   copy of essential data that   no   one
bothered to make

    SPREADSHEET:   a program that gives the user quick and  easy access
to   a  wide  variety  of highly detailed  reports   based   on   highly
inaccurate assumptions

    WORD PROCESSOR:  software that magically transforms its user into a
professional (looking) author

    BUSINESS   GRAPHICS:    popular   with  managers   who   understand
neither  decimals,    fractions,    Roman  numerals,  nor  PI,  but have
more than a passing acquaintance with pies and bars

    DATABASE   MANAGER:    a   program  that   allows   the   user   to
manipulate    data    in    every    conceivable    way    except    the
absolutely   essential  one  the program was purchased to do

    INTEGRATED  SOFTWARE:    a  single  product  that  deftly  performs
hundreds   of   functions   the  user   never   needs   and    awkwardly
performs  the half-dozen he uses constantly and never works the way  the
salesman said it would

    WINDOWS:   an  ingenious method of dividing a computer screen  into
two or more unusably tiny portions.

    USER  GROUP:   where you go for support after your local dealership
(or the factory) goes bankrupt


                   -={ The Night of the Hackers }=-

                 by Richard Sanza, NEWSWEEK Magazine

As  you  are  surveying the dark and misty swamp you  come  across  what
appears to be a small cave.   You light  a  torch  and  enter.  You have
walked   several   hundred  feet when you stumble  into  a  bright  blue
portal.   .  .  With a  sudden  burst  of  light  and  a  loud explosion
you are swept into . . . DRAGONFIRE   . . .  Press Any Key if You Dare."

You  have programmed your personal computer to dial into  Dragonfire,  a
computer bulletin board in Gainesville,   Texas.  But before you get any
information,  Dragonfire demands your name, home city  and phone number.
So,   for tonight's tour of the electronic wilderness you become Montana
Wildhack of San Francisco.

Dragonfire,   Sherwood   Forest  (sic),   Forbidden  Zone,   Blottoland,
Plovernet,   The Vault,  Shadowland,  PHBI and scores of other  computer
bulletin  boards  are  hangouts of a new generation  of  vandals.  These
precocious  teenagers use their electronic skills to play  hide-and-seek
with  computer  and   telephone   security   forces.    Many    computer
bulletin   boards  are  perfectly legitimate:   they resemble electronic
versions   of  the  familiar  cork  boards  in supermarkets  and  school
corridors,  listing services and providing information someone out there
is  bound to find  useful.   But  this is  a walk on the wild  side,   a
trip  into  the  world of underground bulletin   boards   dedicated   to
encouraging  --  and  making   --  mischief.

The  phone  number  for  these  boards  are  as  closely  guarded  as  a
psychiatrist's  home  telephone  number.   Some numbers are  posted   on
underground   boards;   others   are exchanged over  the  telephone.   A
friendly  hacker provided Dragonfire's number.   Hook up and you  see  a
broad  choice  of topics offered.  For Phone Phreaks -- who  delight  in
stealing    service    from    AT&T   and    other    phone    networks.
Phreakenstein's  Lair is a potpourri of phone numbers,  access codes and
technical  information.   For  computer hackers -- who dial  into  other
people's  computers  -- Ranger's Lodge is chock-full of   phone  numbers
and   passwords  for government,   university and  corporate  computers.
Moving  through Dragonfire's offerings,   you  can  only marvel  at  how
conversant these teen-agers are with the technical esoterica of  today's
electronic  age.   Obviously  they  have spent  a great  deal   of  time
studying  computers,   though their grammar and spelling  indicate  they
haven't been diligent  in  other  subjects.  You are constantly reminded
of how young they are.

"Well it's that time of year again.  School is back in session so  let's
get  those  high school computer phone numbers rolling in.  Time to  get
straight  A's,   have perfect  attendance  (except  when you've been  up
all night hacking school passwords),  and messing up you worst teacher's
paycheck."

Forbidden Zone,  in Detroit, is offering ammunition for hacker civil war
-- tips  on   crashing   the  most   popular   bulletin-board  software.
There  also are plans for building black,   red and blue boxes to  mimic
operator tones and get free phone service.  And  here  are  the  details
for   "the  safest  and  best  way  to  make  and  use  nitroglycerine,"
compliments  of  Doctor  Hex,  who says he got  it  "from  my  chemistry
teacher."

Flip  through  the "pages." You have to wonder if this  information   is
accurate.   Can  this  really be the phone number and password for  Taco
Bell's  computer?   Do these kids really have  the dial-up  numbers  for
dozens of university computers?  The temptation is  too much.   You sign
off and have your computer dial the number for the Yale computer.  Bingo
-- the  words  Yale University  appear on your screen.   You  enter  the
password.  A menu appears. You hang up in a sweat. You are now a hacker.

Punch  in  another number and your modem zips off the  touchtones.  Here
comes the tedious side of all of this.  Bulletin boards are popular.  No
vacancy  in Bates Motel (named for Anthony Perkin's creepy motel in  the
movie "Psycho");  the line is busy.   So are 221 B.  Baker Street, PHBI,
Shadowland and The Vault,   Caesar's Palace rings  and  connects.   This
is  different breed of board.   Caesar's Palace is a combination  Phreak
board and computer store in  Miami.   This  is  the  place to learn ways
to mess up a department store's anti-shoplifting system,   or make  free
calls   on   telephones  with locks  on  the   dial.   Pure   capitalism
accompanies such anarchy, Caesar's Palace is offering good deals on disc
drives,   software,  computers  and  all  sorts of hardware.  Orders are
placed through electronic mail messages.

'Tele-Trial':  Bored  by  Caesar's  Palace,  you enter  the  number  for
Blottoland,  the board operated by one of  the  nation's  most notorious
computer phreaks -- King Blotto.   This one has been busy all night, but
it's now pretty late in Cleveland.  The phone rings and you connect.  To
get past the blank screen, type the secondary password "S-L-I-M-E." King
Blotto obliges,  listing his rules:  he must have your real name,  phone
number,   address,   occupation and interests. He will call and disclose
the primary password, "if you belong on this board." If admitted, do not
reveal  the  phone number or  the  secondary password,   lest  you  face
"tele-trial," the King warns as he dismisses  you  by  hanging  up.  You
expected   heavy security,   but this teenager's security is,   as  they
say,  awesome.   Computers  at  the Defense Department and  hundreds  of
businesses  let  you  know when you've reached them.   Here you  need  a
password   just to find out what system answered the phone.   Then  King
Blotto asks questions -- and hangs up.   Professional  computer-security
experts  could learn something from this kid.   He knows that ever since
the 414 computer hackers were arrested in August  1982,  law-enforcement
officers   have   been   searching  for  leads   on   computer  bulletin
boards.

"Do you have any ties to or connections with any law enforcement  agency
or  any  agency which would inform such a law enforcement agency of this
bulletin board?"

Such is the welcoming message from Plovernet, a Florida board known  for
its  great hacker/phreak files.   There amid a string of valid VISA  and
MasterCard  numbers  are   dozens   of   computer   phone  numbers   and
passwords.   Here  you also learn what Blotto means by tele-trial.   "As
some of you may or may not know,  a session of the conference  court was
held  and  the Wizard was found guilty of some  miscellaneous   charges,
and  sentenced  to  four  months  without bulletin  boards."  If  Wizard
calls,  system operators like King Blotto disconnect him. Paging through
bulletin  boards is a test of your patience.  Each board  has  different
commands.   Few  are easy to follow,   leaving you to hunt and peck your
way  around.   So far you haven't had the nerve  to  type   "C,"   which
summons    the   system  operator  for  a   live,   computer-to-computer
conversation.   The time,  however,  however  has  come for you to ask a
few questions of the "sysop." You dial a computer in Boston.  It answers
and you  begin working your way throughout the menus. You scan a handful
of   dial-up   numbers,    including  one  for  Arpanet,    the  Defense
Department's research computer.  Bravely tap C and in seconds the screen
blanks and your cursor dances across the screen.

    Hello . . . What kind of computer do you have?

Contact.  The sysop is here.  You exchange amenities and get  "talking."
How much hacking does he do?   Not much, too busy. Is he afraid of being
busted,   having  his  computer confiscated like  the Los  Angeles   man
facing  criminal  changes  because his computer bulletin board contained
a  stolen  telephone-credit-card  number?   "Hmmmm  .   .   .   No,"  he
replies.   Finally,   he asks the dreaded question:  "How old are  you?"
"How  old  are  YOU,"  you  reply,  stalling.   "15,"  he  types.   Once
you  confess  and  he knows you're old enough to  be  his  father,   the
conversation  gets  very  serious.   You fear  each  new  question;   he
probably  thinks  you're  a cop.   But all he wants to  know   is   your
choice  for  president.   The  chat continues,   until  he  asks,  "What
time  is it there?" Just past midnight, you reply. Expletive. "it's 3:08
here,"  Sysop  types.   "I  must be going to sleep.   I've  got   school
tomorrow."  The  cursor dances "*********** Thank you for Calling."  The
screen goes blank.

Epilog:

A few weeks after this reporter submitted this article to Newsweek,   he
found  that his credit had been altered,  his drivers' licence  revoked,
and  EVEN HIS Social  Security  records  changed!   Just in case you all
might like to construe this as a 'Victimless' crime.  The  next  time  a
computer  fouls up your billing on some matter,  and  COSTS  YOU,  think
about it!

This  the  follow-up  to the previous article  concerning  the  Newsweek
reporter.   It spells out SOME of the REAL dangers to  ALL of us, due to
this type of activity!

                  -={ The REVENGE of the Hackers }=-

In  the  mischievous  fraternity of computer  hackers,  few  things  are
prized  more  than  the  veil  of  secrecy.   As  NEWSWEEK San Francisco
correspondent  Richard  Sandza found out after  writing  a story on  the
electronic underground's (DISPATCHES,  Nov.  12, 1986 ability  to  exact
revenge  can  be  unnerving.  Also  severe....  Sandza's report:

"Conference!" someone yelled as I put the phone to my ear.   Then came a
mind-piercing  "beep,"  and  suddenly  my   kitchen   seemed  full    of
hyperactive   15-year-olds.   "You   the  guy who wrote the  article  in
NEWSWEEK?"  someone shouted from the depths  of  static,  and   giggles.
"We're   going  disconnect your phone," one shrieked.   "We're going  to
blow up your house," called another. I hung up.

Some  irate  readers  write letters to the  editor.  A  few  call  their
lawyers.    Hackers,   however,  use  the  computer  and  the telephone,
and  for  more  than simple comment.  Within  days,  computer  "bulletin
boards"   around  the  country were lit up with  attacks  on  NEWSWEEK's
"Montana  Wildhack"  (a name I took from a  Kurt   Vonnegut  character),
questioning  everything  from  my manhood to my prose style.   "Until we
get  real good revenge," said  one  message  from Unknown  Warrior,   "I
would  like to suggest that everyone with an auto-l modem  call  Montana
Butthack  then hang up when he  answers."  Since  then  the  hackers  of
America have called my home at least 2000 times.   My harshest   critics
communicate  on  Dragonfire,   a Gainesville,   Texas,   bulletin  board
where I am on teletrial,  a video-lynching in which a computer user with
grievance   dials   the  board   and   presses   charges   against   the
offending  party.   Other hackers  --  including  the  defendant  --post
concurrences   or rebuttals.  Despite  the  mealtime interruptions,  all
this was at most a minor nuisance; some was amusing, even fun.


FRAUD:  The  fun stopped with a call from a man who  identified  himself
only as Joe.   "I'm calling to warn you," he said.  When  I barked back,
he  said,  "Wait,  I'm  on your side.   Someone has broken into TRW  and
obtained  a  list of all your credit-card numbers,  your  home  address,
social-security   number   and  wife's  name  and  is  posting   it   on
bulletin  boards  around the country." He named the charge cards  in  my
wallet.

Credit-card numbers are a very hot commodity among some hackers.  To get
one from a computer system and  post  it  is  the hacker  equivalent  of
making  the team.   After hearing from Joe I visited the local office of
the  TRW  credit  bureau and got  a  copy of  my  credit  record.   Sure
enough,  it showed a Nov.  13 inquiry by the Lenox (Mass.) Savings Bank,
an  institution  with  no  reason whatever  to  ask  about me.   Clearly
some hacker had used Lenox's password to the TRW computers to get to  my
files  (the  bank  has since changed the password).

It  wasn't  long before I found out what was being done with my  credit-
card numbers,  thanks to another friendly hacker who tipped me to Pirate
80,  a bulletin board in Charleston,  W.Va.,  where I found  this:  "I'm
sure you guys have heard about Richard Stza or Montana  Wildhack.   He's
the  guy who wrote the obscene story  about phreaking  in NewsWeek Well,
my friend did a credit card check on TRW .  .  .  try this number, it' a
VISA . .  Please nail this guy bad . . . Captain Quieg.

Captain  Quieg may himself be nailed.  He has violated the Credit   Card
Fraud  Act  of 1984 signed by President Reagan  on  Oct.  12.   The  law
provides  a  $10,000  fine  and  up to  a   15-year   prison  term   for
"trafficking"  in illegally obtained credit-card  account  numbers.   He
"friend"  has  committed   a   felony   violation   of   the  California
computer-crime   law.   TRW   spokeswoman Delia Fernandex said that  TRW
would "be more than  happy  to  prosecute"  both  of them.

TRW  has  good  reason for concern.  Its computers  contain  the  credit
histories   of   120  million people.   Last year TRW  sold  50  million
credit  reports  on  their  customers.   But  these  highly confidential
personal     records    are   so   poorly   guarded   that  computerized
teenagers   can  ransack   the   files   and    depart  undetected.  TRW
passwords  -- unlike  many  others -- often print out when   entered  by
TRW's  customers.   Hackers then look for discarded printouts.   A  good
source:   the   trash  of  banks  and   automobile  dealerships,   which
routinely  do  credit  checks.   "Everybody hacks TRW,"  says  Cleveland
hacker  King  Blotto,   whose bulletin board has  security   system  the
Pentagon would envy.   "It's the easiest." For her her part,   Fernandez
insists that TRW "does everything it  can to keep the system secure.

In my case,  however, that was not enough. My credit limits would hardly
support  big-time fraud,   but victimization takes many  forms.  Another
hacker  said it was likely that merchandise would be ordered in my  name
and  shipped  to me -- just to harass me.   I used to  use   credit-card
numbers   against someone I didn't like," the hacker  said.   "I'd  call
Sears and have a dozen toilets shipped  to his house."

Meanwhile,  back  on  Dragonfire,  my teletrial was going  strong.   The
charges,   as  pressed  my Unknown Warrior,   include  "endangering  all
phreaks and hacks." The judge in this case is  a  hacker  with the   apt
name  of  Ax  Murderer.   Possible sentences range from exile  from  the
entire planet" to "kill the dude." King Blotto has  taken up my defense,
using  hacker  power  to  make  his  first  pleading:    he  dialed   up
Dragonfire,    broke   into  its  operating  system  and "crashed"   the
bulletin  board,   destroying  all  of its messages naming me. The board
is back up now,  with a retrial in full swing.    But then,   exile from
the electronic underground looks better  all the time.



               -={ Subject: Hard Disk Noise Results }=-

                            Author Unknown

A few weeks ago I posted this message requesting help for my  10Mb  hard
disk.

             HELP!!!! HELP!!!! HELP!!!! HELP!!!! HELP!!!!

I have a 10 Mb CMI hard disk on my PC,  mounted in an external  cabinet.
The  HD   never goes "out of service",  but it makes  a  strange  sound.
Shortly after power up and then every once in a while after that,  there
is  a   very  strange whining sound.   It has never interfered with  the
data on it, but I worry that there is something wrong.  Can something be
oiled or what?

- Please send mail, I will post a summary.

I  have gotten many responses and almost as many solutions.   Here  then
are  the possible  solutions  to the problem.   I am still unsure as  to
which  I will try,  but...   To the people who  responded,  Thanks.   To
other, with same problem, here are some of the possibilities.
This is the Summary of rec'd msgs:

This  noise is often caused by a slight rubbing of the drive's   spindle
brakes.   It   usually requires a radical disassembly of the drive on  a
clean air bench to adjust ('though CMI may have  done  it  differently).
If  the  noise  is  not excessively annoying, your data is okay.  If the
noise  is excessively annoying,  your data is still okay but  components
in  you  drive's  brake  mechanism  are wearing out a little faster than
normal.

          ==================================================

I  don't  know  specifically about the  CMI  drives,   but   many   10Mb
drives   are  constructed  with  a  copper  spring  which  contacts  the
motor spindle to remove static electricity.   The spring usually  has  a
finger  in  the  center  which contacts  the  spindle, and is surrounded
by copper.  This spring can resonate, creating a whine or a squeal.  The
fix  is to take some silicone rubber and  put two drops where the finder
joins the rest of the copper:


          ___________            #################
         |                       #*              #
         |                       #############   #
         spring side view        #*              #
                                 #################
                       top view - apply silicone to '*' areas


          =================================================

Sounds  like  you are losing a bearing in the  spindle.   If   this   is
indeed  the case  the drive will totally fail in 6 months to a year.   I
suggest you back it up regularly.

          =================================================

I  have the same setup and same noise on my Shugart 606 8 MByte   drive.
I  was told by a very knowledgeable hardware guy that it is some bushing
or  other  that  is  not critical and only annoying.   It  seems  to  be
lessening with use.

          =================================================

I  am  sorry  to say that the whining sound is just the  nature  of  the
beast.    We have  dozens  of  hard  disks  at  work,   some  whine  all
the  time,  some whine intermittently,  other don't whine at  all.   The
whining  seems totally  unrelated to  whether  the  drive will  fail  or
not.   I  don't think there is anyway to oil the drives,  since they are
sealed and breaking that seal is  inviting  trouble.   If  it  gets  bad
enough,   you   might  want  to  consult  the  manufacturer  for   their
recommendation.

           ================================================

I have an Eagle 1630 (XT somewhat-compatible) that made an  intermittent
whining noise.    I  don't  know  whether or not it was a CMI,  but that
sounds familiar.   Fortunately, it was still under warranty (by a matter
of  weeks) and so  I  took it  in  for  work.    Not  after  taking   it
out  to  look at it.   No, there is absolutely nothing to be oiled -- it
is undoubtably a sealed unit, bearings and all.  I believe that it had a
bearing  going out,  which I would imagine could be dangerous to data if
left to wear.   If particles didn't  start  flying  around,  slowing the
disk rotation would eventually cause problems.   Better get it fixed  --
and do some backups.

          =================================================

When I used to work computer repair,  we had  people  complain  of  such
noises about  three  or  four  times  a day.  Every time the problem was
caused  by the static ring on the bottom of the Hard Disk (the  ring  in
the   center  of  the bottom  of  the  drive  that  touches  a  ball  to
drain  off rotational static).   Anyway,  the fix to this problem is  to
lightly  lift  the ring off of the ball and let it snap  back.   I  have
never seen this fail and the drive will shut up for a long time.   If it
doesn't work then you haven't snapped the ring hard enough.

          ==================================================

What you are probably hearing is the disk finding a bad track or sector.
This  sector  has already been mapped out by the format  procedure,  but
the controller must be reset to find home.   The reset uses the  slowest
step  rate  for the  disk drive head motor,  thus the  strange  growling
whine.

          ==================================================

Not  to  worry - I've used these drives myself,  and that "whining"   is
just  the drive recalibrating itself, occasionally.

          ==================================================

Do  you have an AT&T 6300 with the "sidecar" expansion disk,  the   baby
that   is attached  to  the  left-hand  side  of the AT&T CPU  box?   If
so,   the  problem  is  pretty  well  known,   at  least  here  at  AT&T
International, and can be fixed pretty easily:

Open  up  the  sidecar and take a look at the disk.   You  can  put  the
entire  unit on  its side, so that the expansion box is on top, and then
the  disk  drive  will be turned 90  degrees,  back  to  the  horizontal
orientation that most of the world uses.    On  the  top,  there will be
a small metal arm with some kind of carbon brush under it.   As the disk
turns,  this   brush  is  making  contact  with  the surface  underneath
it (not actually the disk platter, of course, but it turns with the disk
anyway).   It is not actually supposed to make  contact  with  the disk;
it just does.  Hence the noise.

(I  hope  you  realize  that  most  of  these  are  more  humerous  than
informative  and have  been  re-printed here for  entertainment purposes
only.    -Editor)


{end of file}